Search Results - (( basic loading optimization algorithm ) OR ( java _ detection algorithm ))
Search alternatives:
- loading optimization »
-
1
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
2
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013“…Due to the importance of blood vessel detection in many medical tools and the increasing demand for portable diagnosis equipment, fast blood vessel detection algorithm in a standalone and portable device is very important. …”
Get full text
Get full text
Conference or Workshop Item -
3
Ant colony optimization for solving economic dispatch of power system: article / Muhammad Shukri Che Hashim
Published 2009“…Economic load dispatch problem is allocating loads to plants for minimum cost while meeting the constraints. …”
Get full text
Get full text
Article -
4
Ant colony optimization for solving economic dispatch of power system / Muhammad Shukri Che Hashim
Published 2009“…Economic load dispatch problem is allocating loads to plants for minimum cost while meeting the constraints. …”
Get full text
Get full text
Thesis -
5
Optimal placement and sizing of distributed generators for voltage-dependent load model in radial distribution system
Published 2017“…The proposed study has been applied to the IEEE 33 radial distribution system with basic particle swarm optimization (PSO) algorithm. …”
Get full text
Get full text
Article -
6
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Optimal load shedding for microgrids with unlimited DGs
Published 2013“…The main objective of this project is to optimize the load shedding in the micro grid system with unlimited DG’s by applied optimization technique Gravitational Search Algorithm (GSA). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
Long-term optimal planning for renewable based distributed generators and battery energy storage systems toward enhancement of green energy penetration
Published 2025“…The backward reduction method (BRM) is then applied to streamline the number of generated scenarios, reducing computational efforts. To solve the optimization planning model, a hybrid optimization algorithm is proposed, combining the non-dominating sorting genetic algorithm (NSGAII) and multi-objective particle swarm optimization (MOPSO). …”
Article -
9
Detection and extraction features for signatures images via different techniques
Published 2019Get full text
Get full text
Conference or Workshop Item -
10
On spectral efficiency maximization in a partial joint processing system using a multi-start particle swarm optimization algorithm
Published 2015“…However, achieving equivalent backhaul reduction based on limited feedback channel state information is challenging when linear techniques, such as zero-forcing beamforming (BF) are used, which led to the use of stochastic algorithms instead. Therefore stochastic multi-start particle swarm optimization algorithm (MSPSOA) is proposed in this paper to achieve backhaul reduction and address the issue of lack of diversity, which is related to the basic particle swarm optimization algorithm (BPSOA). …”
Get full text
Get full text
Conference or Workshop Item -
11
An approach for cross-site scripting detection and removal based on genetic algorithms.
Published 2014“…In this paper, we propose to explore an approach based on genetic algorithms that will be able to detect and remove cross-site scripting vulnerabilities from the source code before an application is deployed. …”
Get full text
Get full text
Conference or Workshop Item -
12
Fitness value based evolution algorithm approach for text steganalysis model
Published 2013“…In this paper, we present a new alternative method for text steganalysis based on an evolution algorithm, implemented using the Java Evolution Algorithms Package (JEAP).The main objective of this paper is to detect the existence of hidden messages ased on fitness values of a text description.It is found that the detection performance has been influenced by two groups of fitness values which are good fitness value and bad fitness value. …”
Get full text
Get full text
Article -
13
Cross-site scripting detection based on an enhanced genetic algorithm
Published 2015“…In this paper, we propose to explore an approach based on genetic algorithms that will be able to detect cross-site scripting vulnerabilities in the source code before an application is deployed. …”
Get full text
Get full text
Conference or Workshop Item -
14
Development of cell formation algorithm and model for cellular manufacturing system
Published 2011“…The basic bacteria foraging has been successful in solving single objective non-matrix space NP-hard optimization problems. …”
Get full text
Get full text
Thesis -
15
Identification of microcalcification in mammographic images / Noor Azliza Abdul Shauti
Published 2008“…Identification microcaicifications images application was developed to improve detection of microcaicifications efficiency in image quality and high detection efficiency in early detection environments. …”
Get full text
Get full text
Thesis -
16
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The results reveal that the proposed hybrid algorithm is capable of achieving classification accuracy values of (95.82 % and 97.68 %), detection rates values of (95.8 % and 99.3 %) and false alarm rates values of (0.083 % and 0.045 %) on both KDD CUP 99 and NSL KDD. …”
Get full text
Get full text
Thesis -
17
Text steganalysis using evolution algorithm approach
Published 2012“…This study presents a new alternative of steganalysis method in order to detect hidden messages in text steganalysis called Evolution Detection Steganalysis System (EDSS) based on the evolution algorithm approach under Java Genetic Algorithms Package (JGAP). …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
Heuristic resource allocation algorithm for controller placement in multi-control 5G based on SDN/NFV architecture
Published 2021“…A Greedy Randomized Search (GRS) algorithm was used to solve the dynamic assignment of nodes to controllers to achieve load balancing. …”
Get full text
Get full text
Get full text
Article -
19
-
20
Backtracking search algorithm for optimal power dispatch in power system / Mostafa Modiri Delshad
Published 2016“…Backtracking search algorithm (BSA) as the new evolutionary technique of optimization is used for solving the problems. …”
Get full text
Get full text
Thesis
