Search Results - (( development background optimization algorithm ) OR ( java data function algorithm ))

Refine Results
  1. 1

    Fuzzy modeling using Bat Algorithm optimization for classification by Noor Amidah, Ahmad Sultan

    Published 2018
    “…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  2. 2

    Algorithmic Loan Risk Prediction Method Based on PSO-EBGWO-Catboost by Chen, Suihai, Bong, Chih How, Chiu, Po Chan

    Published 2024
    “…In this method, the Gray Wolf optimized algorithm (EBGWO) is further optimized by particle swarm optimization (PSO), and when combined with it, the convergence performance of the model is improved, the parameters of the model are reduced, and the model is simplified. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Multi-Reservoir System Optimization Based on Hybrid Gravitational Algorithm to Minimize Water-Supply Deficiencies by Karami, Hojat, Farzin, Saeed, Jahangiri, Aylin, Ehteram, Mohammad, Kisi, Ozgur, El-Shafie, Ahmed

    Published 2019
    “…Several methods based on algorithms have been developed in recent years in a bid to optimize water release operation policy, in order to overcome or minimize the impact of droughts. …”
    Get full text
    Get full text
    Article
  4. 4
  5. 5

    Image clustering comparison of two color segmentation techniques by Subramaniam, Kavitha Pichaiyan

    Published 2010
    “…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Meta-Heuristic Algorithms for Learning Path Recommender at MOOC by Son, N.T., Jaafar, J., Aziz, I.A., Anh, B.N.

    Published 2021
    “…We have developed Metaheuristic algorithms includes the Genetic Algorithm (GA) and Ant Colony Optimization Algorithm (ACO), to solve the proposed model. …”
    Get full text
    Get full text
    Article
  9. 9

    Metaheuristic optimization techniques for localization in outdoor wireless sensor networks: a comprehensive review by Gumaida, Bassam, Ibrahim, Adamu Abubakar

    Published 2025
    “…This paper serves as a comprehensive background on localization algorithms and methods used in wireless sensor networks, offering insights for researchers to develop efficient localization algorithms tailored to specific application requirements in diverse work environments.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Web-based RIG performance reporting system using interactive visualization techniques / Amir Hambaly Nasaruddin by Nasaruddin, Amir Hambaly

    Published 2019
    “…For the user to analyze the result, the system provides visual analytics technique which can educate the user on analyzing the result which is drill down and sorting function to educate users. The result of this project is all algorithm for visualizing data is functioning and the output produced from the system is correct and effective. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography by Naji, Ahmed Wathik, Zaidan, B.B., Hameed, Shihab A., O-Khalifa, Othman

    Published 2009
    “…The system includes two main functions; first is the hiding of the information in unused area 2 of PE-file (.EXE file), through the execution of four process (specify the cover file, specify the information file, encryption of the information, and hiding the information) and the second function is the extraction of the hiding information through three process (specify the steno file, extract the information, and decryption of the information) and The proposed system is implemented by using java.…”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Application of Optimization Methods for Solving Clustering and Classification Problems by Shabanzadeh, Parvaneh

    Published 2011
    “…Clustering problem is discussed as a problem of non-smooth, non-convex optimization and a new method for solving this optimization problem is developed. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Automated bilateral negotiation with incomplete information in the e-marketplace. by Jazayeriy, Hamid

    Published 2011
    “…The MGT algorithm is useful to explore the properties of the Pareto-optimal offers. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Personalized administration of contrast medium with high delivery rate in low tube voltage coronary computed tomography angiography by Tan, Sock Keow, Ng, Kwan Hoong, Yeong, Chai Hong, Raja Aman, Raja Rizal Azman, Sani, Fadhli Mohamed, Abdul Aziz, Yang Faridah, Sun, Zhonghua

    Published 2019
    “…Background: High delivery rate is an important factor in optimizing contrast medium administration in coronary computed tomography angiography (CCTA). …”
    Get full text
    Get full text
    Article
  15. 15
  16. 16

    Challenges of hidden data in the unused area two within executable files by Naji, Ahmed Wathik, Zaidan, A.A., Zaidan, B.B.

    Published 2009
    “…The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Adaptive path finding algorithm in dynamic environment for warehouse robot by Ng, Mun Kit, Chong, Yung Wey, Ko, Kwang man, Park, Young Hoon, Leau, Yu Beng

    Published 2020
    “…One of the fundamental components when designing a warehouse robot is path finding algorithm. In the past, many path finding algorithms had been proposed to identify the optimal path and improve the efficiency in different conditions. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Segmentation of pulmonary cavity in lung CT scan for tuberculosis disease by Tan, Zhuoyi, Madzin, Hizmawati, Khalid, Fatimah, Beng, Ng Seng

    Published 2024
    “…The algorithm, first, calculates the optimal threshold for separating the lesion from the background region. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Hyperparameter tuned deep learning enabled intrusion detection on internet of everything environment by Ahmed Hamza, Manar, Hassan Abdalla Hashim, Aisha, G. Mohamed, Heba, S. Alotaibi, Saud, Mahgoub, Hany, S. Mehanna, Amal, Motwakel, Abdelwahed

    Published 2022
    “…In this background, the current study develops Intelligent Multiverse Optimization with Deep Learning Enabled Intrusion Detection System (IMVO-DLIDS) for IoT environment. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Multiple and solid data background scheme for testing static single cell faults on SRAM memories by Zakaria, Nor Azura

    Published 2013
    “…Therefore, the purpose of this thesis is to introduce a Data Background (DB) scheme to generate an optimal March Test Algorithm (MTA) for detecting faults of memory that are undetectable using existing algorithms. …”
    Get full text
    Get full text
    Thesis