Search Results - (( developing practical evolution algorithm ) OR ( java optimization approach algorithm ))

Refine Results
  1. 1

    A heuristics approach for classroom scheduling using genetic algorithm technique by Ahmad, Izah R., Sufahani, Suliadi, Ali, Maselan, Mohd Razali, Siti Noor Asyikin

    Published 2017
    “…Genetic Algorithm through Java programming languages were used in this study and aims at reducing the conflicts and optimizes the fitness. …”
    Get full text
    Get full text
    Article
  2. 2

    Optimal route checking using genetic algorithm for UiTM's bus services / Tengku Salman Fathi Tengku Jaafar by Tengku Jaafar, Tengku Salman Fathi

    Published 2006
    “…The genetic algorithm approach that been used in this research has been proven by other research study before that it will easily handle this types of problem where the optimal solution will be generated. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Optimize class time tabling by using genetic algorithm technique in UTHM by Ahmad, Izah Rafidah

    Published 2019
    “…This research used genetic algorithm (GA) that was applied to java programming languages with a goal of reducing conflict and optimizing the fitness. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Navigating challenges and opportunities of machine learning in hydrogen catalysis and production processes: Beyond algorithm development by Salehmin M.N.I., Tiong S.K., Mohamed H., Umar D.A., Yu K.L., Ong H.C., Nomanbhay S., Lim S.S.

    Published 2025
    “…Hence, this comprehensive review delves into the technical, practical, and ethical considerations associated with the application of ML in HER catalyst development and HPP optimization. …”
    Review
  6. 6

    Hybrid DE-PEM algorithm for identification of UAV helicopter by Tijani, Ismaila, Akmeliawati, Rini, Legowo, Ari, Budiyono, Agus, Abdul Muthalif, Asan Gani

    Published 2014
    “…Practical implications – The identification algorithm is expected to facilitate the required model development for model-based control design for autonomous helicopter development. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Optimization of an extended H-infinity controller for unmanned helicopter control using multiobjective differential evolution (MODE) by Tijani, Ismaila Bayo, Akmeliawati, Rini, Legowo, Ari, Budiyono, Agus

    Published 2015
    “…Purpose – The purpose of this paper is to develop a multiobjective differential evolution (MODE)-based extended H-infinity controller for autonomous helicopter control. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  8. 8
  9. 9

    A robotwall simulator by Hor, Keng Seng

    Published 2005
    “…These algorithms are developed for a simulated robot that uses an array of range finders for navigation. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  10. 10

    An enhancement of multi-factor weighted approach technique in prioritizing test cases by comparing similarity distance by Al-Shaibani, Alaa Alrhman Mohammed Raweh, Ahmad, Johanna, Hassan, Rohayanti, Baharom, Salmi, Antari, Dwinta Suci

    Published 2025
    “…The research experiment has shown the process of calculating the Distance matrix for the sample Java Programs and subsequent evaluation using the mutation testing approach and APFD calculation. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    Web-based expert system for material selection of natural fiber- reinforced polymer composites by Ahmed Ali, Basheer Ahmed

    Published 2015
    “…But, the computer oriented materials selection and knowledge-based expert systems are the robust approach in materials selection to handle huge amount of materials of choice. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Parameter extraction of solar photovoltaic modules using penalty-based differential evolution by Ishaque, K., Salam, Z., Mekhilef, Saad, Shamsudin, A.

    Published 2012
    “…The analyses carried out using synthetic current-voltage (I-V) data set showed that the proposed P-DE outperforms other Evolutionary Algorithm methods, namely the simulated annealing (SA), genetic algorithm (GA), and particle swarm optimization (PSO). …”
    Get full text
    Get full text
    Article
  14. 14
  15. 15

    Fingerprint frontier: the evolution of biometric security by Khalifa, Othman Omran

    Published 2023
    “…Chapter Seven, "Best Practice in Fingerprint Security," emerges as a guiding light, delivering complete methods and procedures for developing and maintaining safe fingerprint systems, with a steadfast dedication to not simply identifying issues but also offering answers. …”
    Get full text
    Get full text
    Get full text
    Book
  16. 16

    SecPath: Energy efficient path reconstruction in wireless sensor network using iterative smoothing by Abd, Wamidh Jwdat

    Published 2019
    “…Wireless sensor networks operate through commonly self-organized sensor nodes to transfer data in a multi-hop approach to a central sink. In order to support fine-grained diagnostic analysis and optimize the performance level of the networks, the reconstruction of per-packet routing path is essential. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    Energy efficient path reconstruction in wireless sensor network using iPath by Hasan, Sazlinah, Abd, Wamidh Jwdat, Ariffin, Ahmad Alauddin

    Published 2019
    “…Wireless sensor networks operate through commonly self-organized sensor nodes to transfer data in a multi-hop approach to a central sink. In order to support fine-grained diagnostic analysis and optimize the performance level of the networks, the reconstruction of per-packet routing path is essential. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Automatic generation of neural game controller using single and bi-objective evolutionary optimization algorithms for RTS Game by Chang, Kee Tong

    Published 2015
    “…The proposed EC methods are Genetic Algorithm (GA), Differential Evolution (DE), Evolutionary Programming (EP), and Pareto-based Differential Evolution (PDE). …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Conclusion by Alginahi, Yasser M., Kabir, M. Nomani

    Published 2019
    “…The first six chapters of the book provide the fundamental details of the authentication technologies.The objective of Chapters 7 to 11 is to develop fast and secure algorithms for resource-constrained IoT and cloud computing, while the aim of Chapter 12 is to protect the data by laws and policies. …”
    Get full text
    Get full text
    Get full text
    Book Chapter