Search Results - (( development exploration method algorithm ) OR ( java implication _ algorithm ))

Refine Results
  1. 1

    Development of heuristic methods based on genetic algorithm (GA) for solving vehicle routing problem by Ismail, Zuhaimy, Nurhadi, Irhamah, Zainuddin, Zaitul Marlizawati

    Published 2008
    “…Genetic Algorithm as population-based methods are better identifying promising areas in the search space, while Tabu Search and Simulated Annealing as trajectory methods are better in exploring promising areas in search space. …”
    Get full text
    Get full text
    Monograph
  2. 2
  3. 3

    Efficient Sequential and Parallel Routing Algorithms in Optical Multistage Interconnection Network by Abduh Kaid, Monir Abdullah

    Published 2005
    “…The first approach is to develop an efficient sequential algorithm for the window method. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Computational Thinking (Algorithms) Through Unplugged Programming Activities: Exploring Upper Primary Students’ Learning Experiences by Bih Loong, Lim, Chwen Jen, Chen

    Published 2021
    “…The aim of this study is to explore the experience of primary school students on their learning of algorithms, which is one of the CT skills, through the UPA method. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  6. 6
  7. 7

    Solving transcendental equation using genetic algorithm / Masitah Hambari by Masitah , Hambari

    Published 2004
    “…This project studies and explores the potential of using Genetic Algorithm to solve Transcendental Equation. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Estimation of photovoltaic models using an enhanced Henry gas solubility optimization algorithm with first-order adaptive damping Berndt-Hall-Hall-Hausman method by Ramachandran, Murugan, Sundaram, Arunachalam, Ridha, Hussein Mohammed, Mirjalili, Seyedali

    Published 2024
    “…The existing literature extensively explores the utilization of powerful Metaheuristic Algorithms (MAs) to address the complex constrained optimization problem in PV systems and achieve optimal solutions. …”
    Get full text
    Get full text
    Article
  10. 10

    Wireless sensor nodes deployment using multi-robot based on improved spanning tree algorithm by Arezoumand, Reza

    Published 2015
    “…Developing an exploration algorithm based on spanning tree is the main contribution. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Multi-Objective Multi-Exemplar Particle Swarm Optimization Algorithm with Local Awareness by Noori, Mustafa Sabah, Sahbudin, Ratna K.Z., Sali, Aduwati, Hashim, Fazirulhisyam

    Published 2024
    “…Additionally, our method employs an improved initialization phase using equal sampling for each decision variable to ensure a comprehensive exploration of the entire solution space. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Elitist hybrid migrating birds optimization and genetic algorithm based strategy for T-way test suite generation by Hasneeza Liza, Zakaria

    Published 2020
    “…Software is essential in our multifaceted lifestyle today, from everyday usage to space exploration. Testing is a crucial part of software development as it determines whether the developed software is met its requirements. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Cryptanalysis of elliptic curve scalar multiplication algorithms by Leong, Zhen Hong

    Published 2025
    “…This project explores scalar multiplication algorithms in Elliptic Curve Cryptography, focusing on the binary method and elliptic net method applied in Elliptic Curve Diffie-Hellman and Elliptic Curve Digital Signature Algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  14. 14

    Development of an intelligent system using Kernel-based learning methods for predicting oil-palm yield. by Md. Sap, Mohd. Noor, Awan, A. Majid

    Published 2005
    “…Therefore, it simplifies exploration of the associated structure in the data. …”
    Get full text
    Get full text
    Article
  15. 15

    Multi-Objective Portfolio Optimization Strategy using the SPEA-II Algorithm by Azarberahman, Alireza, Tohidinia, Malihe, Aliakbarzadeh, Hossein

    Published 2025
    “…In the finance world, the precise selection and optimization of stock portfolios are of paramount importance. This study explores the application of intelligent algorithms, particularly the multi-objective of Strength Pareto Evolutionary Algorithm II (SPEA-II), alongside traditional methods to determine optimal portfolios. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Application of genetic algorithm and JFugue in an evolutionary music generator by Tang, Jia Rou

    Published 2025
    “…This project explores the application of Genetic Algorithms (GA) with JFugue, which is a Java-based music programming library to develop an Evolutionary Music Generator. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  17. 17
  18. 18

    Cryptanalysis of elliptic curve scalar multiplication algorithms by Leong, Zhen Hong

    Published 2025
    “…This project explores scalar multiplication algorithms in Elliptic Curve Cryptography, focusing on the binary method and elliptic net method applied in Elliptic Curve Diffie-Hellman and Elliptic Curve Digital Signature Algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  19. 19

    Optimised content-social based features for fake news detection in social media using text clustering approach by Yahya, Adnan Hussein Ali

    Published 2025
    “…The developed fake news detection model is tested on the PHEME dataset by conducting several experiments against different baseline methods. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Rao-SVM machine learning algorithm for intrusion detection system by Abd, Shamis N., Alsajri, Mohammad, Ibraheem, Hind Raad

    Published 2020
    “…Most of the intrusion detection systems are developed based on optimization algorithms as a result of the increase in audit data features; optimization algorithms are also considered for IDS due to the decline in the performance of the human-based methods in terms of their training time and classification accuracy. …”
    Get full text
    Get full text
    Get full text
    Article