Search Results - (( developing public optimization algorithm ) OR ( java data function algorithm ))
Search alternatives:
- public optimization »
- function algorithm »
- data function »
- java »
-
1
Fuzzy modeling using Bat Algorithm optimization for classification
Published 2018“…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
2
Predicting attackers of online shaming using ant colony optimization / Noor Shafiqa Fazlien Mohamad Fauzi
Published 2020“…This study implemented Ant Colony Optimization Algorithm to develop classification rules for predicting the attackers of online shaming. …”
Get full text
Get full text
Thesis -
3
Modelling and optimization of a transit services with feeder bus and rail system / Mohammadhadi Almasi
Published 2015“…This is followed by application of the improved model to the benchmark and Petaling Jaya study areas. In this study, optimized transit services and coordinated schedules are developed using metaheuristic algorithms such as genetic algorithm (GA), particle swarm optimization (PSO), water cycle algorithm (WCA) and imperialist competitive algorithm (ICA). …”
Get full text
Get full text
Thesis -
4
Comparison between multi-objective and single-objective optimization for the modeling of dynamic systems
Published 2013Get full text
Working Paper -
5
-
6
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
-
8
Improvement and application of particle swarm optimization algorithm
Published 2025Get full text
Get full text
Article -
9
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
10
-
11
-
12
Wind farm layout design using cuckoo search algorithm
Published 2016“…Due to its sheer complexity, the wind farm layout design problem is considered a complex optimization problem. In recent years, several attempts have been made to develop techniques and algorithms for optimization of wind farms. …”
Get full text
Get full text
Conference or Workshop Item -
13
-
14
-
15
-
16
Web-based RIG performance reporting system using interactive visualization techniques / Amir Hambaly Nasaruddin
Published 2019“…For the user to analyze the result, the system provides visual analytics technique which can educate the user on analyzing the result which is drill down and sorting function to educate users. The result of this project is all algorithm for visualizing data is functioning and the output produced from the system is correct and effective. …”
Get full text
Get full text
Thesis -
17
Sub-route reversal repair mechanism and differential evolution for urban transit network design problem
Published 2017“…This thesis considers the urban transit network design problem (UTNDP) focusing on the implementation of population-based metaheuristic approaches, specifically on differential evolution (DE) and particle swarm optimization (PSO). The main goal is to develop solution methods that can be used to determine optimal transit route configuration for urban public transportation systems, specifically for system based on buses. …”
Get full text
Get full text
Thesis -
18
A filtering algorithm for efficient retrieving of DNA sequence
Published 2009“…An automaton-based algorithm is used to develop the filtering process proposed. …”
Get full text
Get full text
Get full text
Article -
19
-
20
Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
Published 2009“…The system includes two main functions; first is the hiding of the information in unused area 2 of PE-file (.EXE file), through the execution of four process (specify the cover file, specify the information file, encryption of the information, and hiding the information) and the second function is the extraction of the hiding information through three process (specify the steno file, extract the information, and decryption of the information) and The proposed system is implemented by using java.…”
Get full text
Get full text
Get full text
Article
