Search Results - (( development goals selection algorithm ) OR ( java data function algorithm ))
Search alternatives:
- selection algorithm »
- function algorithm »
- development goals »
- data function »
- java »
-
1
Fuzzy modeling using Bat Algorithm optimization for classification
Published 2018“…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
2
Enhancing generality of meta-heuristic algorithms through adaptive selection and hybridization
Published 2018Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
4
Designing an algorithm for bioloid humanoid navigating in its indoor environment
Published 2012“…As the navigation map is predetermined, the designed algorithm animates the humanoid to navigate by selecting an optimal route, depending on some external commands, to reach at the goal position. …”
Get full text
Get full text
Get full text
Article -
5
Application of artificial immune system in designing power systems stabilizer
Published 2007“…Mimicking and imitating of biological immune system or better known as the artificial immune system is thus developed. Applying and implementing of the algorithm of the artificial immune system is to develop an immune controller. …”
Get full text
Get full text
Get full text
Thesis -
6
Software metrics selection model for predicting maintainability of object-oriented software using genetic algorithms
Published 2016“…The latest effort to solve this selection problem is the development of the metrics selection model that uses genetic algorithm (GA). …”
Get full text
Get full text
Thesis -
7
Some metaheuristic algorithms for solving multiple cross-functional team selection problems
Published 2022“…The team selection problem has become more complicated in order to achieve multiple goals in its decision-making process. …”
Get full text
Get full text
Article -
8
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
9
Intelligent sizing and output prediction techniques for grid-connected photovoltaic system / Shahril Irwan Sulaiman
Published 2012“…Initially, two intuitive-based sizing algorithms for GCPV system design, termed as Conventional Sizing Algorithm (CSA), were developed based on two design goals. …”
Get full text
Get full text
Book Section -
10
An interactive analytics approach for sustainable and resilient case studies: a machine learning perspective
Published 2023“…Decision-makers have recently recognised the need for sustainable development. Multiobjective optimisation is the most reliable technique to solve multiple sustainable development goals. …”
Get full text
Get full text
Article -
11
Long term energy demand forecasting based on hybrid, optimization: Comparative study
Published 2012“…The objective of this research is to develop a long term energy demand forecasting model that used hybrid optimization.To accomplish this goal, a hybrid algorithm that combined a genetic algorithm and a local search algorithm method has been developed to overcome premature convergence.Model performances of hybrid algorithm were compared with former single algorithm model in estimating parameter values of an objective function to measure the goodness-of-fit between the observed data and simulated results.Averages error between two models was adopt to select the proper model for future projection of energy demand.…”
Get full text
Get full text
Get full text
Article -
12
Minimization of Test Cases and Fault Detection Effectiveness Improvement through Modified Reduction with Selective Redundancy Algorithm
Published 2007“…To achieve such goal, this research modifies and improves the Reduction with Selective Redundancy (RSR) algorithm. …”
Get full text
Get full text
Thesis -
13
Web-based RIG performance reporting system using interactive visualization techniques / Amir Hambaly Nasaruddin
Published 2019“…For the user to analyze the result, the system provides visual analytics technique which can educate the user on analyzing the result which is drill down and sorting function to educate users. The result of this project is all algorithm for visualizing data is functioning and the output produced from the system is correct and effective. …”
Get full text
Get full text
Thesis -
14
Development of coordinating algorithm for rendezvous task of mobile robots
Published 2023“…To accomplish this task, a coordinating algorithm was developed that allows the robots to work together in a distributed manner. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
15
Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
Published 2009“…The system includes two main functions; first is the hiding of the information in unused area 2 of PE-file (.EXE file), through the execution of four process (specify the cover file, specify the information file, encryption of the information, and hiding the information) and the second function is the extraction of the hiding information through three process (specify the steno file, extract the information, and decryption of the information) and The proposed system is implemented by using java.…”
Get full text
Get full text
Get full text
Article -
16
Improving the accuracy of AIRS by incorporating real world tournament selection in resource competition phase
Published 2009“…One of the most important components of AIRS is resource competition. The goal of resource competition is the development of the fittest individuals. …”
Get full text
Get full text
Conference or Workshop Item -
17
Challenges of hidden data in the unused area two within executable files
Published 2009“…The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
Get full text
Get full text
Get full text
Article -
18
Comparison of malware detection model using supervised machine learning algorithms / Syamir Mohd Shahirudin
Published 2022“…The comparison of malware detection model utilising supervised machine learning techniques is the main goal of this project. The objective of this project is to develop the Windows malware detection model using supervised machine learning in Decision Tree, K-NN and Naïve Bayes, to evaluate the performance of malware detection in term of testing and training of the features selection and to compare the accuracy detection model in all three machine learning algorithms. …”
Get full text
Get full text
Student Project -
19
VISUALIZATION OF GENETIC ALGORITHM BASED ON 2-D GRAPH TO ACCELERATE THE SEARCHING WITH HUMAN INTERVENTIONS.
Published 2012“…A tool termed as VIGA-20 (Visualization of Genetic Algorithm using 2-0 Graph) is implemented to accomplish this goal. …”
Get full text
Get full text
Thesis -
20
Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems
Published 2022“…To achieve this goal, an improved Teaching Learning-Based Optimization (ITLBO) algorithm was proposed in dealing with subset feature selection. …”
Get full text
Get full text
Thesis
