Search Results - (( basic generation method algorithm ) OR ( java application matching algorithm ))

Refine Results
  1. 1
  2. 2

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The implementation details shows the difference in accessing and manipulating XML v documents using java based parsers and query languages for XML and the steps needed to access an XML document until we produce a list of association rules . The proposed method, XiFLEX has been implemented using two different techniques (java based & XQuery) and compared with the original FLEX algorithm in its basic implementation and the Apriori algorithm for frequent patterns generation. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Data depublication using : Hashing algorithm / Naimah Nayan by Nayan, Naimah

    Published 2019
    “…The hash value is generated by using hashing algorithm such as Message Digest 5 (MD5) and Secure Hashing Algorithm 1 (SHA-1). …”
    Get full text
    Get full text
    Thesis
  5. 5

    Application of genetic algorithm and JFugue in an evolutionary music generator by Tang, Jia Rou

    Published 2025
    “…This project explores the application of Genetic Algorithms (GA) with JFugue, which is a Java-based music programming library to develop an Evolutionary Music Generator. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6
  7. 7
  8. 8
  9. 9

    Algorithm development for optimization of a refrigeration system by Izzat, Mohamad Adnan

    Published 2010
    “…The thesis describes the step by step the method to find an algorithm by using experimental data. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  10. 10
  11. 11

    Securing cloud data system (SCDS) for key exposure using AES algorithm by Thabet Albatol, Mohammed Samer Hasan

    Published 2021
    “…The AES algorithm has its own structure to encrypt and decrypt sensitive data that make the attackers difficult to get the real data when encrypting by AES algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Optimal power flow based on fuzzy linear programming and modified Jaya algorithms by Alzihaymee, Warid Sayel Warid

    Published 2017
    “…Meanwhile, the proposed QOJaya algorithm produces better results than the basic Jaya method in terms of solution optimality and convergence speed. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Ant colony optimization for solving economic dispatch of power system: article / Muhammad Shukri Che Hashim by Che Hashim, Muhammad Shukri

    Published 2009
    “…An economic dispatch problem, consisting of six generating units is applied to compare the performance of the proposed method with those of genetic algorithm (GA) and simulated annealing (SA). …”
    Get full text
    Get full text
    Article
  14. 14

    Ant colony optimization for solving economic dispatch of power system / Muhammad Shukri Che Hashim by Che Hashim, Muhammad Shukri

    Published 2009
    “…An economic dispatch problem, consisting of six generating units is applied to compare the performance of the proposed method with those of genetic algorithm (GA) and simulated annealing (SA). …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    Backtracking search algorithm for optimal power dispatch in power system / Mostafa Modiri Delshad by Mostafa, Modiri Delshad

    Published 2016
    “…The main objectives of the power dispatch problem are to minimize the generation cost and emission amount of generators as well as to meet the power demand. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Penggunaan penggugusan subtraktif bagi menjana peraturan kabur by Agus Priyono, Muhammad Ridwan, Ahmad Jais Alias, Riza Atiq O. K. Rahmat, Azmi Hassan, Mohd. Alauddin Mohd. Ali

    Published 2005
    “…By using the fuzzy clustering algorithm, membership function could be counted based on two possible clustering methods. …”
    Get full text
    Get full text
    Article
  18. 18

    Knowledge-based genetic algorithm for multidimensional data clustering by Purnomo, Muhammad Ridwan Andi, Saleh, Chairul, Lagaida, R.L., Hassan, Azmi

    Published 2013
    “…Basically, this method adopts knowledge of what called as appropriate cluster centre for a fixed number of k-cluster. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  19. 19

    Mathematical formulation of tabu search in combinatorial optimization by Ismail, Zuhaimy

    Published 2008
    “…CARP is known to be Non-deterministic Polynomialtime hard (NP-hard) where solutions are obtained through heuristic methods. Tabu Search (TS) is a heuristic method based on the use of prohibition-based techniques and basic heuristics algorithms like local search. …”
    Get full text
    Get full text
    Monograph
  20. 20

    Model of Improved a Kernel Fast Learning Network Based on Intrusion Detection System by Ali, Mohammed Hasan, Mohamed Fadli, Zolkipli

    Published 2019
    “…As network attackers keep changing their methods of attack execution to evade the deployed intrusion-detection systems (IDS), machine learning (ML) algorithms have been introduced to boost the performance of the IDS. …”
    Get full text
    Get full text
    Conference or Workshop Item