Search Results - (( development case minimization algorithm ) OR ( java data function algorithm ))
Search alternatives:
- minimization algorithm »
- function algorithm »
- case minimization »
- development case »
- data function »
- java »
-
1
Test case minimization applying firefly algorithm
Published 2018Get full text
Get full text
Get full text
Article -
2
Fuzzy modeling using Bat Algorithm optimization for classification
Published 2018“…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
3
Minimization of Test Cases and Fault Detection Effectiveness Improvement through Modified Reduction with Selective Redundancy Algorithm
Published 2007“…Most test suite minimization techniques remove redundant test cases with respect to a particular coverage criterion at a time. …”
Get full text
Get full text
Thesis -
4
Optimal sizing and location of distributed generation for power loss minimization using bee colony algorithm
Published 2023“…The ABC algorithm method has been implemented into the test system of IEEE 33 bus system which is showed in 3 cases. …”
text::Final Year Project -
5
TBat: A Novel Strategy for Minimization of T-Way Interaction Test Suite Based on the Particle Swarm Optimization and the Bat Algorithm
Published 2016“…Often, this results into combinatorial explosion of test cases. This project develops a novel strategy to minimize the test consideration using the Particle Swarm Optimization and the Bat Algorithm.…”
Get full text
Get full text
Conference or Workshop Item -
6
Development of symbolic algorithms for certain algebraic processes
Published 2007Get full text
Get full text
Get full text
Monograph -
7
Development of symbolic algorithms for certain algebraic processes
Published 2007Get full text
Get full text
Get full text
Monograph -
8
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
10
Optimal economic load dispatch using multiobjective cuckoo search algorithm
Published 2023“…In this paper, Multiobjective Cuckoo Search Algorithm (MOCSA) is developed to solve Economic Load Dispatch (ELD) problem. …”
Article -
11
Effect of adopting different dispatching rules on the mean flow time in a two machine batch-shop problem
Published 2005“…This means that it is highly unlikely to find a polynomial algorithm to solve the problem. Therefore, researchers concentrated on developing branch-and-bound or heuristic algorithms. …”
Get full text
Get full text
Get full text
Thesis -
12
Optimization Of Fuzzy Logic Controllers With Genetic Algorithm For Two-Part-Type And Re-Entrant Production Systems
Published 2008“…Furthermore, genetic algorithm (GA) has been used to optimize the FLCs performance. …”
Get full text
Get full text
Thesis -
13
A test case generation framework based on UML statechart diagram
Published 2018“…Furthermore, the algorithms used for test case generation are not provided or well described. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
14
Hybrid multi-objective optimization methods for in silico biochemical system production
Published 2016“…This study aims to design and develop an optimization method that efciently and effectively maximizes the biochemical system production and minimizes the total component concentrations involved simultaneously. …”
Get full text
Get full text
Thesis -
15
A novel peak load shaving algorithm for isolated microgrid using hybrid PV-BESS system
Published 2021“…To evaluate the effectiveness of the algorithm, simulation case studies have been conducted with actual load data and actual PV generation data. …”
Get full text
Get full text
Article -
16
Web-based RIG performance reporting system using interactive visualization techniques / Amir Hambaly Nasaruddin
Published 2019“…For the user to analyze the result, the system provides visual analytics technique which can educate the user on analyzing the result which is drill down and sorting function to educate users. The result of this project is all algorithm for visualizing data is functioning and the output produced from the system is correct and effective. …”
Get full text
Get full text
Thesis -
17
Parameter estimation of cocomo model using the jaya algorithm for software cost estimation
Published 2019“…As a result, COCOMO Jaya Algorithm (COCOMO JA) has been developed. The dataset NASA 63 project, Turkish dataset, and Kemerer dataset have been used. …”
Get full text
Get full text
Undergraduates Project Papers -
18
Modelling and environmental assessment of heterogeneous catalysis biodiesel process using war algorithm
Published 2013“…WAR algorithm which acts as a comparison tool in selecting the environmentally benign design option is developed using heterogeneous catalysis and alkali homogeneous catalysis of biodiesel process as case study. …”
Get full text
Get full text
Undergraduates Project Papers -
19
Study of optimal EG placement in radial distribution system using real coded genetic algorithm
Published 2011“…This paper proposes a study of embedded generation (EG) placement in radial distribution system by utilizing real coded genetic algorithm (RCGA) technique. Several cases of EG models placements are studied in order to minimize the total power losses and to improve voltage profiles of the system. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
Published 2009“…The system includes two main functions; first is the hiding of the information in unused area 2 of PE-file (.EXE file), through the execution of four process (specify the cover file, specify the information file, encryption of the information, and hiding the information) and the second function is the extraction of the hiding information through three process (specify the steno file, extract the information, and decryption of the information) and The proposed system is implemented by using java.…”
Get full text
Get full text
Get full text
Article
