Search Results - (( developing objective evolution algorithm ) OR ( java implementation some algorithm ))

Refine Results
  1. 1

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Multiobjective optimization of bioethanol production via hydrolysis using hopfield- enhanced differential evolution by Ganesan, T., Elamvazuthi, I., Shaari, K.Z.K., Vasant, P.

    Published 2014
    “…In this chapter, the weighted sum scalarization approach is used in conjunction with three meta-heuristic algorithms: Differential Evolution (DE), Hopfield-Enhanced Differential Evolution (HEDE), and Gravitational Search Algorithm (GSA). …”
    Get full text
    Get full text
    Book
  4. 4

    Application of swarm intelligence optimization on bio-process problems / Mohamad Zihin Mohd Zain by Mohamad Zihin , Mohd Zain

    Published 2018
    “…The proposed method is tested on 10 multi-objective benchmark problems of CEC 2009 and compared with four metaheuristics: Multi-Objective Grey Wolf Optimizer (MOGWO), Multi-Objective Evolutionary Algorithm Based on Decomposition (MOEA/D), Multi-Objective Differential Evolution (MODE) and MOPSO. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Fitness value based evolution algorithm approach for text steganalysis model by Din, Roshidi, Samsudin, Azman, Tuan Muda, Tuan Zalizam, Lertkrai, P., Amphawan, Angela, Omar, Mohd Nizam

    Published 2013
    “…In this paper, we present a new alternative method for text steganalysis based on an evolution algorithm, implemented using the Java Evolution Algorithms Package (JEAP).The main objective of this paper is to detect the existence of hidden messages ased on fitness values of a text description.It is found that the detection performance has been influenced by two groups of fitness values which are good fitness value and bad fitness value. …”
    Get full text
    Get full text
    Article
  6. 6

    Route Optimization System by Zulkifli, Abdul Hayy

    Published 2005
    “…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
    Get full text
    Get full text
    Final Year Project
  7. 7

    Design and Implementation of Data-at-Rest Encryption for Hadoop by Wan Nor Shuhadah, Wan Nik, Mohamad Afendee, Mohamed, Zarina, Mohamad, Siti Hanisah, Kamaruzaman

    Published 2017
    “…It is shown that the implementation of AES encryption algorithm is capable to secure data stored in HDFS to some extent.…”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Design and Implementation of Data-at-Rest Encryption for Hadoop by Wan Nor Shuhadah, Wan Nik, Mohamad Afendee, Mohamed, Zarina, Mohamad, Siti Hanisah, Kamaruzaman

    Published 2017
    “…It is shown that the implementation of AES encryption algorithm is capable to secure data stored in HDFS to some extent.…”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Resource allocation in coordinated multipoint long term evolution-advanced networks by Katiran, Norshidah

    Published 2015
    “…The resource allocation algorithm is developed through three phases, namely Low-Complexity Resource Allocation (LRA), Optimized Resource Allocation (ORA) and Cross-Layer Design of ORA (CLD-ORA). …”
    Get full text
    Get full text
    Thesis
  10. 10

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Special protection and control scheme based on generation rescheduling using differential evolution and electromagnetism-like algorithm by Hadi, Mahmaad Khalid

    Published 2016
    “…The main problem with the current generation rescheduling strategies, which is the main SPS technique implemented in this research, is their inefficiency in the sense that they are slow in corrective decision and costly. The main objective of this research is designing a Special Protection and Control Scheme (SPCS) based on a hybrid approach of combining Differential Evolution (DE) and Electromagnetism-Like algorithms. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Development of a Bioinspired optimization algorithm for the automatic generation of multiple distinct behaviors in simulated mobile robots by Hanafi Ahmad Hijazi, Patricia Anthony

    Published 2006
    “…This research explores a new approach of using a multi-objective evolutionary algorithm (MOEA) to evolve robot controllers in performing phototaxis tasks while avoiding obstacles in a simulated 30 physics environment, to overcome problems involving more than one objective, where these objectives usually trade-off among each other and are expressed in different units. …”
    Get full text
    Get full text
    Research Report
  13. 13
  14. 14

    Efficient radio resource management algorithms for downlink long term evolution networks by Mamman, Maharazu

    Published 2018
    “…Hence, the major problem is developing a scheduling algorithm which creates a trade-off between the system performances. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Nonlinear identification of a small scale unmanned helicopter using optimized NARX network with multiobjective differential evolution by Tijani, Ismaila B., Akmeliawati, Rini, Legowo, Ari, Budiyono, Agus

    Published 2014
    “…The current approach in the literature has been largely based on trial and error, while most of the reported optimization approaches have limited the domain of the problem to a single objective problem. This study proposes a hybrid of conventional back propagation training algorithm for the NARX network and multiobjective differential evolution (MODE) algorithm for identification of a nonlinear model of an unmanned small scale helicopter from experimental flight data.The proposed hybrid algorithm was able to produce models with Pareto-optimal compromise between the design objectives. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Fuzzy modeling using Bat Algorithm optimization for classification by Noor Amidah, Ahmad Sultan

    Published 2018
    “…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  17. 17
  18. 18

    A holistic review on artificial intelligence techniques for well placement optimization problem by Islam, J., Vasant, P.M., Negash, B.M., Laruccia, M.B., Myint, M., Watada, J.

    Published 2020
    “…Nature-inspired gradient-free optimization algorithms like particle swarm optimization, genetic algorithm, covariance matrix adaptation evolution strategy and differential evolution have been utilized in this area. …”
    Get full text
    Get full text
    Article
  19. 19

    Automatic generation of neural game controller using single and bi-objective evolutionary optimization algorithms for RTS Game by Chang, Kee Tong

    Published 2015
    “…After that, a bi-objectives algorithm is tested for comparing purposes and this contributed for the next two sub-objectives that is 3) to test the feasibility for implementing the PDE hybrid FFNN. 4) to compare single objective and multi-objective optimization algorithms performances. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Implementation of RIO in UMJaNetSim / Chan Chin We by Chan, Chin We

    Published 2004
    “…In this project, I will do some research on the recent TCP congestion control and avoidance mechanisms and implement one of the mechanisms into the Java Network Simulator (JaNetSim). …”
    Get full text
    Get full text
    Thesis