Search Results - (( developing emerging evolution algorithm ) OR ( java location based algorithm ))
Search alternatives:
- developing emerging »
- evolution algorithm »
- java »
-
1
Application of swarm intelligence optimization on bio-process problems / Mohamad Zihin Mohd Zain
Published 2018“…An improved version of Differential Evolution (DE) namely Backtracking Search Algorithm (BSA) is applied to several fed batch fermentation problems and its performance is compared with recent emerging metaheuristics such as Artificial Algae Algorithm (AAA), Artificial Bee Colony (ABC), Covariance Matrix Adaptation Evolution Strategy (CMAES) and DE. …”
Get full text
Get full text
Thesis -
2
-
3
An improved negative selection algorithm based on the hybridization of cuckoo search and differential evolution for anomaly detection
Published 2018“…It also has the ability to learn, recognize, and remember, thus providing the solid foundation for the development of Artificial Immune System (AIS). Since the emergence of AIS, it has proved itself as an area of computational intelligence. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
4
Group formation using genetic algorithm
Published 2009“…However, due to lack of programming skills especially in Java programming language and the inability to have meetings frequently among the group members,most of the students’ software project cannot be delivered successfully.To solve this problem, systematic group formation is one of the initial factors that should be considered to ensure that every group consists of quality individuals who are good in Java programming and also to ensure that every group member in a group are staying closer to each other.In this research, we propose a method for group formation using Genetic Algorithms, where the members for each group will be generated based on the students’ programming skill and location of residential colleges.…”
Get full text
Get full text
Get full text
Get full text
Monograph -
5
Fingerprint frontier: the evolution of biometric security
Published 2023“…Chapter Seven, "Best Practice in Fingerprint Security," emerges as a guiding light, delivering complete methods and procedures for developing and maintaining safe fingerprint systems, with a steadfast dedication to not simply identifying issues but also offering answers. …”
Get full text
Get full text
Get full text
Book -
6
Multi-floor indoor location estimation system based on wireless local area network
Published 2007“…The most probable match is selected and returned as estimated location based on Bayesian filtering algorithm. Estimated location is reported as physical location and symbolic location. …”
Get full text
Get full text
Thesis -
7
Nonlinear identification of a small scale unmanned helicopter using optimized NARX network with multiobjective differential evolution
Published 2014“…Apart from the effectiveness of the optimized model, the proposed design algorithm is expected to facilitate timely development of the nonparametric model of the helicopter system.…”
Get full text
Get full text
Get full text
Article -
8
-
9
Proposed algorithm for scheduling in computational grid using backfilling and optimization techniques
Published 2016“…In recent years, the fast evolution in the industry of computer hardware such as the processors, has led the application developers to design advanced software's that require massive computational power.Thus, grid computing has emerged in order to handle the computational power demands requested by the applications.Quality of service (QoS) in grid is highly required in order to provide a high service level to the users of Grid.Several interactions events are involved in determining the QoS level in grid such as; allocating the resources for the jobs, monitoring the performance of the selected resources and the computing capability of the available resources. …”
Get full text
Get full text
Get full text
Article -
10
The exploration of hybrid metaheuristics-based approaches: A bibliometric analysis
Published 2025“…The rapid evolution of computational intelligence has driven significant interest in hybrid metaheuristics, which combine multiple optimization algorithms to solve complicated problems more efficiently. …”
Get full text
Get full text
Get full text
Article -
11
Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform
Published 2009“…The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…Subsequently, this project embedded with a lightweight Geo-Encryption algorithm to preserve the privacy of real-time GPS location. …”
Get full text
Get full text
Get full text
Academic Exercise -
13
Audio files comparator using wavelet transform and similarity metrics
Published 2025“…This project is a development-based project revolving around signal processing. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
14
Friendship Degree and Tenth Man Strategy: A new method for differentiating between erroneous readings and true events in wireless sensor networks
Published 2023“…The second stage will validate the voting process through a novel perspective based on the TMS. TMS will check the voters’ replies based on the event’s location. …”
Get full text
Get full text
Article -
15
Heart-design nexus: the emotion algorithm
Published 2025“…It is at once a reflection on the historical development of Kansei Engineering, a documentation of my personal contributions to the field, and a forward-looking exploration of emerging trends and future possibilities. …”
Get full text
Get full text
Book -
16
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
17
Fault tolerance structures in Wireless Sensor Networks (WSNs): survey, classification, and future directions
Published 2022“…Fault tolerance structures contain three fundamental stages: error detection, error diagnosis, and error recovery. The emergence of analytics and the depth of harnessing it has led to the development of new fault-tolerant structures and strategies based on artificial intelligence and cloud-based. …”
Get full text
Get full text
Article -
18
Bridging the gap: technological innovations and sustainability towards transforming disability products / Norida Abu Bakar … [et al.]
Published 2024“…From smart prosthetics equipped with sensor arrays and AI algorithms to wearable devices integrating biofeedback mechanisms, the landscape of assistive technology is undergoing a remarkable evolution. …”
Get full text
Get full text
Get full text
Book Section -
19
Transparent insights into alzheimer’s progression: a time-aware approach with explainable
Published 2024“…The ADNI dataset, comprising 2980 observations, was employed for developing a prediction model using various machine learning classifiers. …”
Get full text
Get full text
Get full text
Article -
20
Fuzzy-based multi-agent approach for reliability assessment and improvement of power system protection
Published 2015“…The second agent is a reliability evaluation agent that uses a recursive algorithm to predict the suitability generator based on the frequency and duration reliability indices in each state while the third agent is the storage and transfer of data between the other two agents. …”
Get full text
Get full text
Thesis
