Search Results - (( developing classical evolutionary algorithm ) OR ( java application matching algorithm ))
Search alternatives:
- classical evolutionary »
- developing classical »
- application matching »
- java application »
-
1
-
2
-
3
Performance improvement through optimal location and sizing of distributed generation / Zuhaila Mat Yasin
Published 2014“…Next, a novel hybrid Artificial Neural Network - Quantum-Inspired Evolutionary Programming (QIEP-ANN) is developed for comparison. …”
Get full text
Get full text
Thesis -
4
Advances in fatigue life modeling: A review
Published 2018“…However, the most notable one to be found is the application of evolutionary optimization algorithms for, e.g., genetic algorithms, artificial neural networking, and differential ant-stigmergy algorithms. …”
Get full text
Get full text
Get full text
Get full text
Article -
5
-
6
Methods of aircraft trajectory optimisation in air combat
Published 2007“…The evader must find the trajectory that avoids or maximises the time to interception, while the pursuer must find a trajectory that achieves or minimises the time to intercept the evader. An algorithm has been developed and implemented using Evolutionary Programming. …”
Get full text
Get full text
Article -
7
Seed disperser ant algorithm for optimization / Chang Wen Liang
Published 2018“…The Seed Disperser Ant Algorithm (SDAA) is developed based on the evolution or expansion process of Seed Disperser Ant (Aphaenogaster senilis) colony. …”
Get full text
Get full text
Get full text
Thesis -
8
-
9
-
10
A modified flower pollination algorithm and carnivorous plant algorithm for solving engineering optimization problem
Published 2021“…In this study, two metaheuristic algorithms, namely, modified flower pollination algorithm (MFPA) and carnivorous plant algorithm (CPA), were proposed. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
-
12
-
13
Message based random variable length key encryption algorithm.
Published 2009Get full text
Get full text
Article -
14
Securing cloud data system (SCDS) for key exposure using AES algorithm
Published 2021“…The AES algorithm has its own structure to encrypt and decrypt sensitive data that make the attackers difficult to get the real data when encrypting by AES algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
15
-
16
-
17
An Agent-Based System with Personalization and Intelligent Assistance Services for Facilitating Knowledge Sharing
Published 2006“…The main algorithms used are profile determination and user similarity. …”
Get full text
Get full text
Thesis
