Search Results - (( basic evolution optimization algorithm ) OR ( java communication research algorithm ))
Search alternatives:
- evolution optimization »
- java communication »
- research algorithm »
- basic evolution »
-
1
Comparison between Lamarckian Evolution and Baldwin Evolution of neural network
Published 2006“…We presented hybrid genetic algorithm for optimizing weights as well as the topology of artificial neural networks, by introducing the concepts of Lamarckian and Baldwin evolution effects. …”
Get full text
Get full text
Get full text
Article -
2
Heat exchanger network optimization using differential evolution with stream splitting
Published 2014“…This article introduces a new strategy for HEN optimization using differential evolution algorithm. …”
Get full text
Get full text
Article -
3
Multiple Objective Optimization of Green Logistics Using Cuckoo Searching Algorithm
Published 2016“…Basically, Cuckoo searching algorithm imitates the natural evolution of a population with initial solutions. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Optimal selection of location, sizing and power factor for solar PV plants using differential evolution
Published 2023Conference Paper -
5
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
6
Finding minimum path by using Genetic Algorithm (GA)/ Siti Zuraifah Hashim
Published 2007“…It makes use of three basic operations in order to optimize this problem. …”
Get full text
Get full text
Thesis -
7
Quality of service and energy efficient aware (QEEA) scheduling algorithm for long term evolution (LTE) network / Nurulanis Mohd Yusoff
Published 2017“…The proposed algorithm is compared against other scheduling algorithms, namely, the Channel and QoS Aware (CQA), Priority Set Scheduler (PSS), Proportional Fair (PF), Maximum Throughput (MT) and Blind Average Throughput (BAT). …”
Get full text
Get full text
Thesis -
8
Design of Improved Stream Cipher Algorithms for GSM Communication
Published 2024thesis::master thesis -
9
Gradient-based mutation manta ray foraging optimization (gbm-mrfo) for solving constrained real-world problems
Published 2022“…GbM-MRFO turn out to be a competitive optimization algorithm on solving constrained optimization problem of Three-bar Truss problem. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Network game (Literati) / Chung Mei Kuen
Published 2003“…It should be an interesting, time and value worth topic to research on. By using Java applet, it will give a good interactive response since it does not suffer from the delays or variability of bandwidth associated with network connection. …”
Get full text
Get full text
Thesis -
11
A cluster-based hybrid replica control protocol for high availability in data grid
Published 2019“…Another proposed algorithm is replica placement algorithm which selects and places only one replica in each cluster. …”
Get full text
Get full text
Thesis -
12
Text messaging encryption system
Published 2012“…The programming language that is used to write the program is Java Language.…”
Get full text
Get full text
Undergraduates Project Papers -
13
Securing cloud data system (SCDS) for key exposure using AES algorithm
Published 2021“…In our research project we use to build a local website using the NetBeans Java averments and create our database management by using MySQL language. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
14
-
15
Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform
Published 2009“…The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
A multi-filter feature selection in detecting distributed denial-of-service attack
Published 2019Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
-
18
Mobile application for real time baby sign language recognition using YOLOv8 / Siti Aishah Idris and Ahmad Firdaus Ahmad Fadzil
Published 2024“…The model will be designed and developed using a deep learning algorithm, which is YOLOv8, the latest version of YOLO. …”
Get full text
Get full text
Get full text
Article -
19
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis
