Search Results - (( basic generation ((method algorithm) OR (path algorithm)) ) OR ( java implication _ algorithm ))

Refine Results
  1. 1

    Finding minimum path by using Genetic Algorithm (GA)/ Siti Zuraifah Hashim by Hashim, Siti Zuraifah

    Published 2007
    “…Although this problem can be solved by GA, other methods also exist. Dijkstra's Algorithm is one of them. …”
    Get full text
    Get full text
    Thesis
  2. 2

    MOTION TARGET TRACKING OF MOBILE ROBOTS by NOOR RASHID, NOOR AIMAN

    Published 2015
    “…The main hardware and has been tested with basic programs based on the algorithms of the said methods. …”
    Get full text
    Get full text
    Final Year Project
  3. 3

    Integration of enchanced jump point search (JPS) algorithm with modified bresenham technique for path planning in virtual grid-based environment by Nurul Atikah Janis

    Published 2018
    “…The algorithm which consider the error value, e to increment pixels is the crucial part of the line generation applies the same concept in the second approach, where the error value, e is used as indicator to determine the heuristic cost of the path. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Development of high speed booth multiplier with optimized stuck-at fault implementation by Mohammed Khalid, Muhammad Nazir, Wan Hasan, Wan Zuha, Sulaiman, Nasri, Wagiran, Rahman

    Published 2002
    “…Test for logic circuits are generated to set a sensitive path for a specific fault-effect such Stuck-at-Fault model.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The implementation details shows the difference in accessing and manipulating XML v documents using java based parsers and query languages for XML and the steps needed to access an XML document until we produce a list of association rules . The proposed method, XiFLEX has been implemented using two different techniques (java based & XQuery) and compared with the original FLEX algorithm in its basic implementation and the Apriori algorithm for frequent patterns generation. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Data depublication using : Hashing algorithm / Naimah Nayan by Nayan, Naimah

    Published 2019
    “…The hash value is generated by using hashing algorithm such as Message Digest 5 (MD5) and Secure Hashing Algorithm 1 (SHA-1). …”
    Get full text
    Get full text
    Thesis
  8. 8

    Application of genetic algorithm and JFugue in an evolutionary music generator by Tang, Jia Rou

    Published 2025
    “…This project explores the application of Genetic Algorithms (GA) with JFugue, which is a Java-based music programming library to develop an Evolutionary Music Generator. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  9. 9
  10. 10

    Algorithm development for optimization of a refrigeration system by Izzat, Mohamad Adnan

    Published 2010
    “…The thesis describes the step by step the method to find an algorithm by using experimental data. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  11. 11

    Optimal power flow based on fuzzy linear programming and modified Jaya algorithms by Alzihaymee, Warid Sayel Warid

    Published 2017
    “…Meanwhile, the proposed QOJaya algorithm produces better results than the basic Jaya method in terms of solution optimality and convergence speed. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Ant colony optimization for solving economic dispatch of power system: article / Muhammad Shukri Che Hashim by Che Hashim, Muhammad Shukri

    Published 2009
    “…An economic dispatch problem, consisting of six generating units is applied to compare the performance of the proposed method with those of genetic algorithm (GA) and simulated annealing (SA). …”
    Get full text
    Get full text
    Article
  13. 13

    Ant colony optimization for solving economic dispatch of power system / Muhammad Shukri Che Hashim by Che Hashim, Muhammad Shukri

    Published 2009
    “…An economic dispatch problem, consisting of six generating units is applied to compare the performance of the proposed method with those of genetic algorithm (GA) and simulated annealing (SA). …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15
  16. 16

    Backtracking search algorithm for optimal power dispatch in power system / Mostafa Modiri Delshad by Mostafa, Modiri Delshad

    Published 2016
    “…The main objectives of the power dispatch problem are to minimize the generation cost and emission amount of generators as well as to meet the power demand. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Penggunaan penggugusan subtraktif bagi menjana peraturan kabur by Agus Priyono, Muhammad Ridwan, Ahmad Jais Alias, Riza Atiq O. K. Rahmat, Azmi Hassan, Mohd. Alauddin Mohd. Ali

    Published 2005
    “…By using the fuzzy clustering algorithm, membership function could be counted based on two possible clustering methods. …”
    Get full text
    Get full text
    Article
  18. 18

    Knowledge-based genetic algorithm for multidimensional data clustering by Purnomo, Muhammad Ridwan Andi, Saleh, Chairul, Lagaida, R.L., Hassan, Azmi

    Published 2013
    “…Basically, this method adopts knowledge of what called as appropriate cluster centre for a fixed number of k-cluster. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  19. 19

    Mathematical formulation of tabu search in combinatorial optimization by Ismail, Zuhaimy

    Published 2008
    “…CARP is known to be Non-deterministic Polynomialtime hard (NP-hard) where solutions are obtained through heuristic methods. Tabu Search (TS) is a heuristic method based on the use of prohibition-based techniques and basic heuristics algorithms like local search. …”
    Get full text
    Get full text
    Monograph
  20. 20

    Model of Improved a Kernel Fast Learning Network Based on Intrusion Detection System by Ali, Mohammed Hasan, Mohamed Fadli, Zolkipli

    Published 2019
    “…As network attackers keep changing their methods of attack execution to evade the deployed intrusion-detection systems (IDS), machine learning (ML) algorithms have been introduced to boost the performance of the IDS. …”
    Get full text
    Get full text
    Conference or Workshop Item