Search Results - (( developing implementation bat algorithm ) OR ( java implementation system algorithm ))
Search alternatives:
- developing implementation »
- implementation system »
- java implementation »
- implementation bat »
- system algorithm »
- bat algorithm »
-
1
Hybrid bat algorithm-artificial neural network for modeling operating photovoltaic module temperature: article / Noor Rasyidah Hussin
Published 2014“…Bat algorithm is an optimizer tool and developed using of echolocation characteristics of bats, while the neural network is learning methods that approach the human brain using artificial neurons. …”
Get full text
Get full text
Article -
2
Hybrid bat algorithm hybrid-artificial neural network for modeling operating photovoltaic module temperature / Noor Rasyidah Hussin
Published 2014“…Bat algorithm is an optimizer tool and developed using of echolocation characteristics of bats, while the neural network is learning methods that approach the human brain using artificial neurons. …”
Get full text
Get full text
Thesis -
3
Application of adaptive bats sonar algorithm to minimise car side impact design
Published 2017“…This project was focusing on the modification of bats sonar algorithm (BSA) and renamed to adaptive bats sonar algorithm (ABSA) due to some limitations of previous algorithm. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
4
Non-invasive gliomas grading using swarm intelligence algorithm / Muhammad Harith Ramli
Published 2017“…Bat algorithm is chosen for the development of the prototype for segmentation and classification purpose. …”
Get full text
Get full text
Thesis -
5
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
6
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
7
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
8
A Bat-inspired Strategy for Pairwise Testing
Published 2015“…Complementing the existing work, we propose a novel design and implementation of Bat-inspired algorithm (BA) for pairwise strategy, called Bat-inspired pairwise testing strategy (BPTS). …”
Get full text
Get full text
Get full text
Article -
9
A bat-inspired testing strategy for generating constraints pairwise test suite
Published 2018“…This paper proposes an enhancement design and implementation of BTS strategy for constraints pairwise test generation based on the bat-inspired algorithm (BA). …”
Get full text
Get full text
Get full text
Article -
10
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…Java Media Framework library and the RTP protocol for audio transmission were used as development tools.The developed system designed in this thesis together with experimental results proved that the system could be implemented successfully. …”
Get full text
Get full text
Thesis -
11
Automatic Number Plate Recognition on android platform: With some Java code excerpts
Published 2016“…Hence, the objective of this research is to propose suitable and optimize algorithm for ANPR system on Android mobile phone. …”
Get full text
Get full text
Get full text
Book -
12
Comparative Performance Analysis of Bat Algorithm and Bacterial Foraging Optimization Algorithm using Standard Benchmark Functions
Published 2014“…Over the last 30 years, many meta-heuristic algorithms have been developed in the literature including that of Simulated Annealing (SA), Genetic Algorithm (GA), Ant Colony Optimization (ACO), Particle Swarm Optimization (PSO), Harmony Search Algorithm (HS) to name a few. …”
Get full text
Get full text
Conference or Workshop Item -
13
Café Web Based System Using Priority Scheduling Approach
Published 2017“…The system is implemented at UniSZA’s café where two different types of user will use the system. …”
Get full text
Get full text
Conference or Workshop Item -
14
Java based expert system for selection of natural fibre composite materials
Published 2013“…In this paper, we develop a technology for the materials selection system using Java based expert system. The weighted-range method (WRM) was implemented to identify the range value and to scrutinise the candidate materials. …”
Get full text
Get full text
Get full text
Article -
15
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
16
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013“…In this paper, the blood vessel detection system is implemented and optimized in a portable device running Android OS on an ARM-based processor. …”
Get full text
Get full text
Conference or Workshop Item -
17
Route Optimization System
Published 2005“…Using that process, we have settled on Java as our development platform as we found it able to both implement DA and the GIS component (map display and manipulation). …”
Get full text
Get full text
Final Year Project -
18
Pairwise testing tools based on hill climbing algorithm (PTCA)
Published 2014“…The actual implementation of the algorithm which is in Java programming language, the program is implemented on Net Bean 7.0.1. …”
Get full text
Get full text
Undergraduates Project Papers -
19
Classification System for Heart Disease Using Bayesian Classifier
Published 2007“…In this system a Bayesian algorithm was used in order to implement the system. …”
Get full text
Get full text
Thesis -
20
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item
