Search Results - (( developing third selection algorithm ) OR ( java validation using algorithm ))
Search alternatives:
- selection algorithm »
- developing third »
- validation using »
- third selection »
- java validation »
- using algorithm »
-
1
Priority and dynamic quantum time algorithms for central processing unit scheduling
Published 2018“…Central Processing Unit is scheduled using different types of scheduling algorithms. One of the most widely algorithm used in scheduling with sharing and batch operating systems is Round Robin. …”
Get full text
Get full text
Thesis -
2
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…The simulation model was developed using Active Server Page, JavaScript and SQL 7.0 as database. …”
Get full text
Get full text
Get full text
Thesis -
3
The Bacterial Foraging Optimisation Algorithm using Prototype Selection and Prototype Generation for Data Classification
Published 2020“…Therefore, we conclude that the proposed BFOA-G is the best algorithm in the study, and PG approach is recommended for further development of BFOA as an IS algorithm.…”
Get full text
Get full text
Get full text
Thesis -
4
Enhanced grey wolf optimisation algorithm for feature selection in anomaly detection
Published 2022“…Experimental results of the EBGWO algorithm on the NSL-KDD dataset in terms of number of selected features and classification accuracy are superior to other benchmark optimisation algorithms. …”
Get full text
Get full text
Thesis -
5
A new standardisation and selection framework for real-time image dehazing algorithms from multi-foggy scenes based on fuzzy Delphi and hybrid multi-criteria decision analysis meth...
Published 2020“…Given the rapid development of dehazing image algorithms, selecting the optimal algorithm based on multiple criteria is crucial in determining the efficiency of an algorithm. …”
Get full text
Get full text
Get full text
Article -
6
Multi-Hop Selective Constructive Interference Flooding Protocol For Wireless Sensor Networks
Published 2019“…MSCIF integrates three main algorithms: clustering algorithm, selection algorithm, and a synchronized flooding. …”
Get full text
Get full text
Thesis -
7
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…In addition, the randomness of the session key generated from the MLCG is verified using NIST test suite. Besides that, the security of the proposed protocol is validated using the formal analysis tool, AVISPA. …”
Get full text
Get full text
Thesis -
8
Dynamic Bayesian networks and variable length genetic algorithm for designing cue-based model for dialogue act recognition
Published 2010“…In the second stage, the developed variable length genetic algorithm is used to select different sets of lexical cues to constitute the dynamic Bayesian networks' random variables. …”
Get full text
Get full text
Article -
9
Efficient selective encryption schemes to secure video data and moving objects information for HEVC/H.265 using advanced encryption standard / Mohammed Ahmed Mohammed Saleh
Published 2016“…All of those encryption algorithms are classified as asymmetric and symmetric algorithms. …”
Get full text
Get full text
Thesis -
10
A framework of test case prioritisation in regression testing using particle swarm-artificial bee colony algorithm
Published 2024“…Ten knowledge and domain experts provided positive feedback on the framework's verification, affirming the framework's robustness. Validation was conducted through three experiments involving four Java programs. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
A novel hybrid classification model of genetic algorithms, modified k-Nearest Neighbor and developed backpropagation neural network
Published 2014“…Second, the obtained results that included arrays of the top-ranked features were used as the initial population of a genetic algorithm to produce optimum arrays of features. Third, using a modified k-Nearest Neighbor method as well as an improved method of backpropagation neural networks, the classification process was advanced based on optimum arrays of the features selected by genetic algorithms. …”
Get full text
Get full text
Get full text
Article -
12
Review of the research landscape of multi-criteria evaluation and bench- marking processes for many-objective optimisation methods: coherent taxonomy, challenges and recommended so...
Published 2020“…Third, the development phase involves the creation of a decision matrix for MaOO selection on the basis of the integrated BWM and VIKOR method. …”
Get full text
Get full text
Article -
13
LASSO-type estimations for threshold autoregressive and heteroscedastic time series models.
Published 2020“…In this thesis, we propose Least Absolute Shrinkage and Selection Operator (LASSO) type estimators to perform simultaneous parameter estimation and model selection for five specific univariate and multivariate time series models, and develop several algorithms to compute these estimators. …”
Get full text
Get full text
UMK Etheses -
14
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…On the Construction phase, the development of the prototype has been started. All the algorithm for the engine has been developed by using Java script language. …”
Get full text
Get full text
Thesis -
15
Development of intelligent evaluation system for product end-of-life selection strategy
Published 2011“…This problem can be best resolved by promoting end-of-life (EOL) selection strategies. The main objective of this research is to develop an evaluation system for selecting EOL strategy specifically for remanufacturing. …”
Get full text
Get full text
Thesis -
16
Efficient genetic partitioning-around-medoid algorithm for clustering
Published 2019“…This study utilizes genetic algorithms based upon the medoid rather than the mean as a centroid-selection schema to improve the clustering efficiency. …”
Get full text
Get full text
Thesis -
17
Web-Based Route Optimization System For Logistic Using Agglomerative Clustering And Genetic Algorithm
Published 2020“…In this project, evolutionary prototype methodology was selected to smooth the software development according to the scopes and also the requirements. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
18
Adaptive differential evolution algorithm with fitness based selection of parameters and mutation strategies / Rawaa Dawoud Hassan Al-Dabbagh
Published 2015“…The performance of DE algorithm depends heavily on the selected mutation strategy and its associated control parameters. …”
Get full text
Get full text
Thesis -
19
Performance analysis of pair-wise error probability for 1/3 and 1/4 subcarrier mapping ICI-SC scheme in STFBC MIMO-OFDM system / Norhayati Abdullah
Published 2015“…The simulation results expressively show that the one third method subcarrier mapping technique with Decision Feedback Equalizer (DFE) and adaptive algorithm can provide the best system performance compared to the existing subcarrier mapping methods .The results shows that by using the one-third subcarrier mapping scheme with an adaptive algorithm Normalised Least Means Square (NLMS), an efficient bandwidth can be achieved, ICI and ISI effects can be reduced with 24% of improvement compared to one-third subcarrier mapping Recursive Least Square (RLS) DFE in the MIMO-OFDM system.…”
Get full text
Get full text
Thesis -
20
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…The circuits have been designed by proteus, the microcontrollers have been programmed by micro C, and the Graphical User Interface (GUI) has been implemented in Java. Few by electronic components such as RFID, multiplexer, XBee, and servo motors have been used to realize the system. …”
Get full text
Get full text
Thesis
