Search Results - (( developing agent _ algorithm ) OR ( java optimization techniques algorithm ))
Search alternatives:
- optimization techniques »
- java optimization »
- developing agent »
-
1
-
2
-
3
Computer Lab Timetabling Using Genetic Algorithm Case Study - Unit ICT
Published 2006“…Genetic Algorithm is one of the most popular optimization solutions used in various applications such as scheduling. …”
Get full text
Get full text
Thesis -
4
Hybrid genetic algorithm for improving fault localization
Published 2018“…Genetic algorithm (GA) is well known in finding an optimal solution to a problem while local search is capable of removing duplication. …”
Get full text
Get full text
Get full text
Article -
5
Parallel distributed genetic algorithm development based on microcontrollers framework
Published 2023Conference paper -
6
Examination timetabling using genetic algorithm case study: KUiTTHO
Published 2005“…Genetic Algorithm (GA) is one of the most popular optimization solutions. …”
Get full text
Get full text
Thesis -
7
Scalable approach for mining association rules from structured XML data
Published 2009Get full text
Get full text
Conference or Workshop Item -
8
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…Recently, various techniques based on different algorithms have been developed. …”
Get full text
Get full text
Thesis -
9
Examination Timetabling Using Genetic Algorithm Case Study : KUiTTHO
Published 2005“…Genetic Algorithm (GA) is one of the most popular optimization solutions. …”
Get full text
Get full text
Get full text
Thesis -
10
Improving Class Timetabling using Genetic Algorithm
Published 2006“…We have targeted the research on class timetabling problem. Hence, Genetic Algorithm (GA) is used as one of the most popular optimization solutions. …”
Get full text
Get full text
Get full text
Thesis -
11
AGENT MEETING SCHEDULER
Published 2011“…An agent meeting scheduler prototype then will be developed to prove that the selected algorithm is working properly. …”
Get full text
Get full text
Final Year Project -
12
-
13
An enhancement of multi-factor weighted approach technique in prioritizing test cases by comparing similarity distance
Published 2025“…Therefore, numerous factors and techniques have been used to optimize the prioritization process. …”
Get full text
Get full text
Get full text
Article -
14
Secured Autonomous Agent-Based Intrusion Detection System (SAAIDS)
Published 2024thesis::master thesis -
15
Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun
Published 2000“…In order to develop an intelligent agent, various programming techniques are used in achieving the property of self learning, information retrieval and searching algorithm. …”
Get full text
Get full text
Thesis -
16
Agent-based extraction algorithm for computational problem solving
Published 2015“…Four agents have been proposed as an agent based model for CPS, which are User_Agent, PAC_Agent, IPO_Agent and Algorithm_Agent. …”
Get full text
Get full text
Thesis -
17
-
18
A collaborative navigation algorithm for multi-agent robots in autonomous reconnaissance mission
Published 2010“…Some research papers based on collaborative robots have been reviewed in this paper; from review analysis we have developed an algorithm with behavioral based distributed knowledge of multi-agents for accomplishing collaborative navigation. …”
Get full text
Get full text
Get full text
Proceeding Paper -
19
A conceptual multi-agent framework using ant colony optimization and fuzzy algorithms for learning style detection
Published 2023“…We propose a new dimension to detect learning styles, which involves the individuals of learners' social surrounding such as friends, parents, and teachers in developing a novel agent-based framework. The multi-agent system applies ant colony optimization and fuzzy logic search algorithms as tools to detecting learning styles. …”
Conference Paper -
20
Cohesive token passing algorithm utilizing software agents
Published 2010“…The developed software agent is utilized to implement prioritized token access subject to the traffic type. …”
Get full text
Get full text
Article
