Search Results - (( affecting implementation during algorithm ) OR ( java optimization method algorithm ))
Search alternatives:
- affecting implementation »
- implementation during »
- java optimization »
- during algorithm »
- method algorithm »
-
1
Route Optimization System
Published 2005“…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
Get full text
Get full text
Final Year Project -
2
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…Enhance hybrid genetic algorithm and particle Swarm optimization are developed to select the optimal device in either fog or cloud. …”
Get full text
Get full text
Article -
3
Fuzzy modeling using Bat Algorithm optimization for classification
Published 2018“…In order to solve it, Bat Algorithm method is implement in to optimization method in fuzzy modeling for classification. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
4
Optimal route checking using genetic algorithm for UiTM's bus services / Tengku Salman Fathi Tengku Jaafar
Published 2006“…This research study with the development of the Optimal Route Checking Using Genetic Algorithm system should solve this scenario. …”
Get full text
Get full text
Thesis -
5
Optimize class time tabling by using genetic algorithm technique in UTHM
Published 2019“…This research used genetic algorithm (GA) that was applied to java programming languages with a goal of reducing conflict and optimizing the fitness. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
6
Input-output based relation combinatorial testing using whale optimization algorithm for generating near optimum number of test suite
Published 2025“…This study proposes a combinatorial testing method utilizing the Whale Optimization Algorithm (WOA). …”
Get full text
Get full text
Get full text
Article -
7
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Features selection process can be considered a problem of global combinatorial optimization in machine learning. Genetic algorithm GA had been adopted to perform features selection method; however, this method could not deliver an acceptable detection rate, lower accuracy, and higher false alarm rates. …”
Get full text
Get full text
Thesis -
8
Comparison of performances of Jaya Algorithm and Cuckoo Search algorithm using benchmark functions
Published 2022“…Metaheuristic algorithms have been used successfully for solving different optimization problems. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…Feature subset selection and classifier ensemble learning are familiar techniques with high ability to optimize above problems. Recently, various techniques based on different algorithms have been developed. …”
Get full text
Get full text
Thesis -
10
GIS mapping and shortest-path algorithm for drone-aided flood rescue operations
Published 2019“…This research aims to implement Geographic Information System (GIS) mapping to identify the major parts of an affected state that are more susceptible to floods and the construction of an optimal shortest path algorithm to conduct the rescue operation.…”
Get full text
Get full text
Get full text
Proceeding Paper -
11
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
12
Web-based expert system for material selection of natural fiber- reinforced polymer composites
Published 2015“…An inappropriate selection of materials for engineering component would result in entire product failure which ultimately has a negative impact on the society. Several algorithms, methods and spreadsheets are being proposed by various researchers in this field to improve materials selection. …”
Get full text
Get full text
Thesis -
13
-
14
A semi-synchronous label propagation algorithm with constraints for community detection in complex networks
Published 2017“…A similarity score, based on the Sørensen-Dice index, is implemented to detect the initial communities and for breaking ties during the propagation process. …”
Get full text
Get full text
Article -
15
Implementation of Frequency Drift for Identification of Solar Radio Burst Type II
Published 2016“…The results of the frequency drift implementation in classification algorithm show that the algorithm developed gave almost similar determination as in manual detection. …”
Get full text
Get full text
Get full text
Article -
16
Improving Channel Assignment for Vehicular Ad-hoc Sensor Network in Disaster Management System
Published 2024“…LTE-A Improved Channel (LTE-AIC) was suggested and implemented with proposed algorithms and methods to compare with conventional LTE-A and LTE as a benchmark. …”
Get full text
Get full text
Get full text
Thesis -
17
Implementation of Frequency Drift for Identification of Solar Radio Burst Type II
Published 2016“…The results of the frequency drift implementation in classification algorithm show that the algorithm developed gave almost similar determination as in manual detection. …”
Get full text
Get full text
Article -
18
Development of dynamic programming algorithm for maintenance scheduling problem
Published 2020“…However, the uncertainty that happened during maintenance or inspections will affect the original schedule and lead to delays or suspension of the task that had been scheduled. …”
Get full text
Get full text
Thesis -
19
Traffic management algorithms for LEO satellite networks
Published 2016“…The problem in network arises during the period of coexistence between UDP and FTP traffic in the same network which could affect their performances. …”
Get full text
Get full text
Get full text
Thesis -
20
Deployment of new dynamic cryptography buffer for SCADA security enhancement
Published 2014“…The DCB contains several fields/sub-fields which have been used during implementation of cryptography algorithm and other information ( or detail) related with protocol security. …”
Get full text
Get full text
Get full text
Article
