Search Results - (( developing formative optimization algorithm ) OR ( java detection system algorithm ))

Refine Results
  1. 1

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Smart student timetable planner by Wong, Xin Tong

    Published 2025
    “…The system is implemented using Node.js with Express for server-side development, HTML, CSS, and JavaScript for the frontend, and Socket.IO for real-time collaboration. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  3. 3

    Optimization of blood vessel detection in retina images using multithreading and native code for portable devices by Tran, Duc Ngoc, Hussin, Fawnizu Azmadi, Yusoff, Mohd Zuki

    Published 2013
    “…The experimental results show that the blood vessel detection system has worked well in the ARM platform with the Android OS. …”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Development of bacteria foraging optimization algorithm for cell formation in cellular manufacturing system considering cell load variations by Nouri, Hossein, Tang, Sai Hong

    Published 2013
    “…This paper investigates the first applications of this emerging novel optimization algorithm to the cell formation (CF) problem. …”
    Get full text
    Get full text
    Article
  5. 5
  6. 6

    Development of cell formation algorithm and model for cellular manufacturing system by Nouri, Hossein

    Published 2011
    “…Therefore, for this proposes good benchmarked algorithm, bacteria foraging algorithm is selected and developed to solve multiobjective cell formation model and traced constraints satisfaction handling to produce feasible optimal solution. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…An Intrusion Detection System is software or application which is used to detect thread, malicious activities and the unauthorized access to the computer system and warn the administrators by generating alarms. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…A GUI is created in a form of JAVA application to display data detected from tag. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Text steganalysis using evolution algorithm approach by Din, Roshidi, Tuan Muda, Tuan Zalizam, Lertkrai, Puriwat, Omar, Mohd Nizam, Amphawan, Angela, Aziz, Fakhrul Anuar

    Published 2012
    “…This study presents a new alternative of steganalysis method in order to detect hidden messages in text steganalysis called Evolution Detection Steganalysis System (EDSS) based on the evolution algorithm approach under Java Genetic Algorithms Package (JGAP). …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Improvement and application of particle swarm optimization algorithm by Deevi, Durga Praveen, Kodadi, Sharadha, Allur, Naga Sushma, Dondapati, Koteswararao, Chetlapalli, Himabindu, Perumal, Thinagaran

    Published 2025
    “…This method combines CPTD with the Genetic Algorithm and PSO (GAPSO), resulting in an effective strategy for dynamic formation reconfiguration and path optimization. …”
    Get full text
    Get full text
    Article
  12. 12

    BASE: a bacteria foraging algorithm for cell formation with sequence data by Nouri, Hossein, Tang, Sai Hong, Baharudin, B. T. Hang Tuah, Mohd Ariffin, Mohd Khairol Anuar

    Published 2010
    “…In addition, a newly developed BFA-based optimization algorithm for CF based on operation sequences is discussed. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    A Social- And Knowledge-Based Coalition Formation Using Modified Combinatorial Particle Swarm Optimization by Kassim, Azleena Mohd

    Published 2017
    “…The related sub-objectives are: 1) to define coalition and social factors to form a coalition formation model, 2) to develop a knowledge representation scheme to store knowledge of formed coalitions, and 3) to develop an effective algorithm to optimize the coalition which can also be treated as a clustering problem. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Optimization of micro-end milling process parameters of titanium alloy using non-dominated sorting genetic algorithm by Golshan, Abolfazl

    Published 2013
    “…Finally, non-dominated sorting genetic algorithm-II as evolutionary optimization approach was used for multi-objective optimization of the micro-end milling process. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Performance properties optimization of triaxial ceramic-palm oil fuel ash by employing Taguchi design and flower pollination algorithm by Zainudin, Azlan

    Published 2018
    “…Besides that, the Taguchi design and FPA were also successfully employed in this research field through the effectiveness of developed optimal design parameters. Taguchi Grey Relational Analysis (GRA) developed following optimal parameters: 15 wt.% of unground POFA, pressed at 2 t, and sintered at 1200 °C for 300 min of soaking time. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    A new routing mechanism for energy-efficient in bluetooth mesh-low power nodes based on wireless sensor network by Almuslehi, Hussein Saad Mohammed

    Published 2023
    “…Compared to the Ant Colony Optimization-Genetic Algorithm (ACO-GA) and Ant Colony Optimization- Hierarchical Clustering Mechanism (ACOHCM), the ACO algorithm shows superior power savings and efficiency. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Empirical modeling of hydrate formation prediction in deepwater pipelines by Hashim, F.M., Abbasi, A.

    Published 2016
    “…The correlations between temperature and pressure are developed by using MATLAB software and then optimize with optimization techniques, such as genetic algorithm and particle swarm optimization. …”
    Get full text
    Get full text
    Article
  20. 20

    Development of a hydrate formation prediction model for sub-sea pipeline by Abbasi, A., Hashim, F.M.

    Published 2017
    “…In this research work, a novel model is developed to the hydrate formation pressure and hydrate formation temperature for a single component of methane (CH4) gas. …”
    Get full text
    Get full text
    Article