Search Results - (( basic interaction optimization algorithm ) OR ( java application during algorithm ))
Search alternatives:
- interaction optimization »
- application during »
- basic interaction »
- java application »
- during algorithm »
-
1
T-way testing : a test case generator based on melody search algorithm
Published 2015“…First, Inputs will be written into a text file and TTT-MS will read the inputs which are the number of Parameters, number of values for each Parameter, Parameter Names, Parameter Values Name and the Interaction Strength (t) up to t=4. Next, TTT-MS will be executed through main algorithms to generate Parameters Interaction List, Parameter Values Interaction List, and finally generate final Test Cases based on Melody Search Algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
2
African Buffalo Optimization Algorithm for Tuning Parameters of a PID Controller in Automatic Voltage Regulators
Published 2016“…Though a recently-designed algorithm, the ABO has been effective and efficient in solving a number of search optimization problems. …”
Get full text
Get full text
Get full text
Article -
3
Automated bilateral negotiation with incomplete information in the e-marketplace.
Published 2011“…The MGT algorithm is useful to explore the properties of the Pareto-optimal offers. …”
Get full text
Get full text
Thesis -
4
Nomadic people optimizer (NPO) for large-scale optimization problems
Published 2019“…The basic component of the algorithm consists of several clans and each clan searches for the best place (or best solution) based on the position of their leader. …”
Get full text
Get full text
Thesis -
5
-
6
SUDOKU HELPER
Published 2015“…In this paper research, author presents an algorithm to provide a tutorial for any Sudoku player who got stuck during the solving process. …”
Get full text
Get full text
Final Year Project -
7
African Buffalo Optimization Strategy for Tuning Parameters of a PID Controller in Automatic Voltage Regulators
Published 2016“…Though a recently-designed algorithm, the ABO has been effective and efficient in solving a number of search optimization problems. …”
Get full text
Get full text
Get full text
Get full text
Article -
8
Improving neural networks training using experiment design approach
Published 2005“…It may be more useful if the neural network could 'actively' obtain the training samples itself sequentially by interacting with its environment. There are several methods of selecting training data from input space for neural networks which include D-optimal and Max-min design approaches. …”
Get full text
Get full text
Thesis -
9
-
10
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
11
Robotic path planning using rapidly-exploring random trees
Published 2013“…However, the planned path by using basic RRT structure might not always be optimal in terms of path length. …”
Get full text
Get full text
Get full text
Thesis -
12
Evaluation method of rationality of urban landscape facility design based on neural network
Published 2025“…Specifically, our work encompasses the following key aspects: 1) Introducing the relevant theoretical knowledge and research progress in urban landscape facility design. 2) Elucidating the basic principles and structures of the backpropagation neural network (BPNN), along with the proposal of an improved genetic algorithm-back propagation neural network (GA-BP) to address the limitations of BPNN. 3) Conducting experiments to determine the optimal parameters for the GA-BP model once training is finished. …”
Get full text
Get full text
Article -
13
-
14
-
15
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
16
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
Published 2015“…This research work was limited to Java based web applications. In future research, the method can be extended to include other programming languages as well as other similar web application security vulnerabilities.…”
Get full text
Get full text
Thesis -
17
Static and dynamic graphs modeling of a boiler system / Noor Ainy Harish
Published 2015“…Since combustion process and evaporation process are the main process occurs in the system, therefore two graphs representing interaction among the species in each of the process in the boiler are constructed. …”
Get full text
Get full text
Thesis -
18
Performance study of the coexistence of Wireless Sensor Networks (WSN) and Wireless Local Area Networks (WLAN) / Muhammad Adib Haron … [et al.]
Published 2008“…To implement WSN integrated with cognitive radio techno 10gy, a new algorithm that provides access mechanism is needed to interactively working with sensor nodes hardware. …”
Get full text
Get full text
Research Reports -
19
Human activity recognition via accelerometer and gyro sensors
Published 2023“…To implement the data engineering system proposed, two mobile applications, SensorData and SensorDataLogger with user-friendly interfaces and intuitive functionalities are developed using Java programming language and Android Studio. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
20
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. Ultimately, the algorithm development program designed earlier is linked up directly to the robotic model for program implementation and verification. …”
Get full text
Get full text
Get full text
Conference or Workshop Item
