Search Results - (( developing integration bat algorithm ) OR ( java validation using algorithm ))

Refine Results
  1. 1

    Improved Bat Algorithm for faster convergence in solving optimisation problem by Ramli, Mohamad Raziff

    Published 2021
    “…In this study, one of the metaheuristic algorithms known as the Bat Algorithm (BA) has been discussed. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    New random approaches of modified adaptive bats sonar algorithm for reservoir operation optimization problems by Nor Shuhada, Ibrahim

    Published 2024
    “…Subsequently, it is exploring into the development of random approaches based on MABSA, integrating components into others algorithm whereby Squirrel Search Algorithm (SSA), Cauchy Mutation (CM) approach, and Doppler Effect (DE) phenomenon. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Extended bat algorithm for PID controller tuning of wheeled mobile robot and swarm robotics target searching strategy by Nur Aisyah Syafinaz, Suarin

    Published 2020
    “…Extended Bat Algorithm (EBA) has been chosen as swarm intelligent based method for this research study. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Flood Routing in River Reaches Using a Three-Parameter Muskingum Model Coupled with an Improved Bat Algorithm by Farzin, Saeed, Singh, Vijay, Karami, Hojat, Farahani, Nazanin, Ehteram, Mohammad, Kisi, Ozgur, Allawi, Mohammed Falah, Mohd, Nuruol Syuhadaa, El-Shafie, Ahmed

    Published 2018
    “…The present study attempted to develop a three-parameter Muskingum model considering lateral flow for flood routing, coupling with a new optimization algorithm namely, Improved Bat Algorithm (IBA). …”
    Get full text
    Get full text
    Article
  5. 5

    Review of Multi-Objective Swarm Intelligence Optimization Algorithms by Yasear, Shaymah Akram, Ku Mahamud, Ku Ruhana

    Published 2021
    “…These reviewed algorithms were mainly developed to solve continuous MOPs. …”
    Get full text
    Get full text
    Article
  6. 6

    Performance evaluation of PID controller parameters gain optimization for wheel mobile robot based on bat algorithm and particle swarm optimization by Nur Aisyah Syafinaz, Suarin, Pebrianti, Dwi, Nurnajmin Qasrina, Ann, Luhur, Bayuaji, Muhammad, Syafrullah, Indra, Riyanto

    Published 2019
    “…Tuning Proportional Integral Differential (PID) controller to the best value of gains is essential to develop a reliable controller for wheel mobile ro-bot (WMR). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Performance evaluation of PID controller parameters gain optimization for wheel mobile robot based on bat algorithm and particle swarm optimization by Nur Aisyah Syafinaz, Suarin, Pebrianti, Dwi, Nurnajmin Qasrina, Ann, Bayuaji, Luhur, Syafrullah, Muhammad, Riyanto, Indra

    Published 2019
    “…Tuning Proportional Integral Differential (PTD) controller to the best value of gains is essential to develop a reliable controller for wheel mobile robot (WMR). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Black widow optimization-based optimal PI-controlled wind turbine emulator by Premkumar K., Vishnupriya M., Babu T.S., Manikandan B.V., Thamizhselvan T., Ali A.N., Islam M.R., Kouzani A.Z., Parvez Mahmud M.A.

    Published 2023
    “…In this article, the parameters of the proportional-integral (PI) controller of the wind turbine (WT) emulator, i.e., proportional and integral gain of the PI controller, are optimized using a black widow optimization algorithm (BWOA). …”
    Article
  9. 9

    Priority and dynamic quantum time algorithms for central processing unit scheduling by Mohammed, Maysoon A.

    Published 2018
    “…Central Processing Unit is scheduled using different types of scheduling algorithms. One of the most widely algorithm used in scheduling with sharing and batch operating systems is Round Robin. …”
    Get full text
    Get full text
    Thesis
  10. 10

    A Model for Evaluation of Cryptography Algorithm on UUM Portal by Norliana, Abdul Majid

    Published 2004
    “…The simulation model was developed using Active Server Page, JavaScript and SQL 7.0 as database. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    IWDSA: a hybrid Intelligent Water Drops with a Simulated Annealing for the localization improvement in wireless sensor networks by Gumaida, Bassam, Ibrahim, Adamu Abubakar

    Published 2024
    “…Additionally, simulation results confirm that the proposed algorithm IWDSA exhibits outstanding performance compared to other algorithms utilizing optimization techniques, including genetic algorithms, bat algorithms, ant colony optimization, and swarm optimization. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…In addition, the randomness of the session key generated from the MLCG is verified using NIST test suite. Besides that, the security of the proposed protocol is validated using the formal analysis tool, AVISPA. …”
    Get full text
    Get full text
    Thesis
  13. 13

    A framework of test case prioritisation in regression testing using particle swarm-artificial bee colony algorithm by Ba-Quttayyan, Bakr Salim Abdullah

    Published 2024
    “…Ten knowledge and domain experts provided positive feedback on the framework's verification, affirming the framework's robustness. Validation was conducted through three experiments involving four Java programs. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…On the Construction phase, the development of the prototype has been started. All the algorithm for the engine has been developed by using Java script language. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…The circuits have been designed by proteus, the microcontrollers have been programmed by micro C, and the Graphical User Interface (GUI) has been implemented in Java. Few by electronic components such as RFID, multiplexer, XBee, and servo motors have been used to realize the system. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Secure E-Voting With Blind Signature by Ibrahim, Subariah, Kamat, Maznah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…The voter’s private key for digital signature is protected by using password-based encryption with SHA and Twofish-CBC algorithm so that only valid voter can use it.…”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Visualisation tool to study malaria transmission using network modelling by Wong,, Ji Yeh

    Published 2014
    “…Java was used to implement the visualisation tool. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  18. 18

    Tacit knowledge for business intelligence framework using cognitive-based approach by Surbakti, Herison

    Published 2022
    “…The framework was tested on 23 librarians from several university libraries in West Java and Yogyakarta, Indonesia. The algorithm starts with a content targeted interview to identify the list of problems faced by librarians. …”
    Get full text
    Get full text
    Thesis
  19. 19

    An enhancement of multi-factor weighted approach technique in prioritizing test cases by comparing similarity distance by Al-Shaibani, Alaa Alrhman Mohammed Raweh, Ahmad, Johanna, Hassan, Rohayanti, Baharom, Salmi, Antari, Dwinta Suci

    Published 2025
    “…The research experiment has shown the process of calculating the Distance matrix for the sample Java Programs and subsequent evaluation using the mutation testing approach and APFD calculation. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20