Search Results - (( developing practical evolution algorithm ) OR ( java optimization approach algorithm ))
Search alternatives:
- optimization approach »
- developing practical »
- practical evolution »
- evolution algorithm »
- java optimization »
-
1
A heuristics approach for classroom scheduling using genetic algorithm technique
Published 2017“…Genetic Algorithm through Java programming languages were used in this study and aims at reducing the conflicts and optimizes the fitness. …”
Get full text
Get full text
Article -
2
Optimal route checking using genetic algorithm for UiTM's bus services / Tengku Salman Fathi Tengku Jaafar
Published 2006“…The genetic algorithm approach that been used in this research has been proven by other research study before that it will easily handle this types of problem where the optimal solution will be generated. …”
Get full text
Get full text
Thesis -
3
Scalable approach for mining association rules from structured XML data
Published 2009Get full text
Get full text
Conference or Workshop Item -
4
Optimize class time tabling by using genetic algorithm technique in UTHM
Published 2019“…This research used genetic algorithm (GA) that was applied to java programming languages with a goal of reducing conflict and optimizing the fitness. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
Navigating challenges and opportunities of machine learning in hydrogen catalysis and production processes: Beyond algorithm development
Published 2025“…Hence, this comprehensive review delves into the technical, practical, and ethical considerations associated with the application of ML in HER catalyst development and HPP optimization. …”
Review -
6
Hybrid DE-PEM algorithm for identification of UAV helicopter
Published 2014“…Practical implications – The identification algorithm is expected to facilitate the required model development for model-based control design for autonomous helicopter development. …”
Get full text
Get full text
Get full text
Article -
7
Optimization of an extended H-infinity controller for unmanned helicopter control using multiobjective differential evolution (MODE)
Published 2015“…Purpose – The purpose of this paper is to develop a multiobjective differential evolution (MODE)-based extended H-infinity controller for autonomous helicopter control. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
8
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
9
A robotwall simulator
Published 2005“…These algorithms are developed for a simulated robot that uses an array of range finders for navigation. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
10
An enhancement of multi-factor weighted approach technique in prioritizing test cases by comparing similarity distance
Published 2025“…The research experiment has shown the process of calculating the Distance matrix for the sample Java Programs and subsequent evaluation using the mutation testing approach and APFD calculation. …”
Get full text
Get full text
Get full text
Article -
11
-
12
Web-based expert system for material selection of natural fiber- reinforced polymer composites
Published 2015“…But, the computer oriented materials selection and knowledge-based expert systems are the robust approach in materials selection to handle huge amount of materials of choice. …”
Get full text
Get full text
Thesis -
13
Parameter extraction of solar photovoltaic modules using penalty-based differential evolution
Published 2012“…The analyses carried out using synthetic current-voltage (I-V) data set showed that the proposed P-DE outperforms other Evolutionary Algorithm methods, namely the simulated annealing (SA), genetic algorithm (GA), and particle swarm optimization (PSO). …”
Get full text
Get full text
Article -
14
-
15
Fingerprint frontier: the evolution of biometric security
Published 2023“…Chapter Seven, "Best Practice in Fingerprint Security," emerges as a guiding light, delivering complete methods and procedures for developing and maintaining safe fingerprint systems, with a steadfast dedication to not simply identifying issues but also offering answers. …”
Get full text
Get full text
Get full text
Book -
16
SecPath: Energy efficient path reconstruction in wireless sensor network using iterative smoothing
Published 2019“…Wireless sensor networks operate through commonly self-organized sensor nodes to transfer data in a multi-hop approach to a central sink. In order to support fine-grained diagnostic analysis and optimize the performance level of the networks, the reconstruction of per-packet routing path is essential. …”
Get full text
Get full text
Thesis -
17
SG-PBFS : Shortest Gap-Priority Based Fair Scheduling technique for job scheduling in cloud environment
Published 2024“…Firstly, a Priority-Based Fair Scheduling (PBFS) algorithm has been introduced to schedule jobs so that jobs can access the required resources at optimal times. …”
Get full text
Get full text
Get full text
Get full text
Article -
18
Energy efficient path reconstruction in wireless sensor network using iPath
Published 2019“…Wireless sensor networks operate through commonly self-organized sensor nodes to transfer data in a multi-hop approach to a central sink. In order to support fine-grained diagnostic analysis and optimize the performance level of the networks, the reconstruction of per-packet routing path is essential. …”
Get full text
Get full text
Get full text
Article -
19
Automatic generation of neural game controller using single and bi-objective evolutionary optimization algorithms for RTS Game
Published 2015“…The proposed EC methods are Genetic Algorithm (GA), Differential Evolution (DE), Evolutionary Programming (EP), and Pareto-based Differential Evolution (PDE). …”
Get full text
Get full text
Get full text
Thesis -
20
Conclusion
Published 2019“…The first six chapters of the book provide the fundamental details of the authentication technologies.The objective of Chapters 7 to 11 is to develop fast and secure algorithms for resource-constrained IoT and cloud computing, while the aim of Chapter 12 is to protect the data by laws and policies. …”
Get full text
Get full text
Get full text
Book Chapter
