Search Results - (( development issues evolution algorithm ) OR ( java data function algorithm ))
Search alternatives:
- evolution algorithm »
- development issues »
- function algorithm »
- issues evolution »
- data function »
- java »
-
1
Fuzzy modeling using Bat Algorithm optimization for classification
Published 2018“…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
2
Multiobjective optimization of bioethanol production via hydrolysis using hopfield- enhanced differential evolution
Published 2014“…In this chapter, the weighted sum scalarization approach is used in conjunction with three meta-heuristic algorithms: Differential Evolution (DE), Hopfield-Enhanced Differential Evolution (HEDE), and Gravitational Search Algorithm (GSA). …”
Get full text
Get full text
Book -
3
-
4
-
5
Special protection and control scheme based on generation rescheduling using differential evolution and electromagnetism-like algorithm
Published 2016“…This SPCS strategy, novel in the generation rescheduling application, is called as Differential Evolution with Adaptive Mutation (DEAM). The specific aims in employing DEAM-based SPCS are to investigate a strategy to resolve the line overloading issue through the N-1 contingency based on the load flow analysis and the severity index develop SPCS scheme through the generation rescheduling strategy based on the hybrid DEAM algorithm. …”
Get full text
Get full text
Thesis -
6
Differential evolution for neural networks learning enhancement
Published 2008“…Three programs have developed; Differential Evolution Neural Network (DENN), Genetic Algorithm Neural Network (GANN) and Particle Swarm Optimization with Neural Network (PSONN) to probe the impact of these methods on ANN learning using various datasets. …”
Get full text
Get full text
Get full text
Thesis -
7
The evolution and trend of chain code scheme
Published 2008Get full text
Get full text
Get full text
Article -
8
Efficient radio resource management algorithms for downlink long term evolution networks
Published 2018“…Hence, the major problem is developing a scheduling algorithm which creates a trade-off between the system performances. …”
Get full text
Get full text
Thesis -
9
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
Automatic generation of neural game controller using single and bi-objective evolutionary optimization algorithms for RTS Game
Published 2015“…Therefore, the main objective of this research is to investigate the performance of single objective and bi-objectives of the hybridised EC as a RTS game controller for reinforcement issue. The proposed EC methods are Genetic Algorithm (GA), Differential Evolution (DE), Evolutionary Programming (EP), and Pareto-based Differential Evolution (PDE). …”
Get full text
Get full text
Get full text
Thesis -
11
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
12
-
13
An FPGA implementation of exp-bet scheduling algorithm in LTE networks / Yusmardiah Yusuf
Published 2017“…Since the implementation of scheduling algorithm is an open issue in LTE, many packet scheduling algorithms have been proposed by researchers. …”
Get full text
Get full text
Thesis -
14
Water level forecasting using feed forward neural networks optimized by African Buffalo Algorithm (ABO)
Published 2019“…These successes motivate the development and investigation of its efficiency in training Feed Forward Neural Networks (FFNNs), for solving training process issues. …”
Get full text
Get full text
Thesis -
15
Web-based RIG performance reporting system using interactive visualization techniques / Amir Hambaly Nasaruddin
Published 2019“…For the user to analyze the result, the system provides visual analytics technique which can educate the user on analyzing the result which is drill down and sorting function to educate users. The result of this project is all algorithm for visualizing data is functioning and the output produced from the system is correct and effective. …”
Get full text
Get full text
Thesis -
16
-
17
Crossover and mutation operators of genetic algorithms
Published 2017“…Genetic algorithms (GA) are stimulated by population genetics and evolution at the population level where crossover and mutation comes from random variables. …”
Get full text
Get full text
Get full text
Article -
18
Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
Published 2009“…The system includes two main functions; first is the hiding of the information in unused area 2 of PE-file (.EXE file), through the execution of four process (specify the cover file, specify the information file, encryption of the information, and hiding the information) and the second function is the extraction of the hiding information through three process (specify the steno file, extract the information, and decryption of the information) and The proposed system is implemented by using java.…”
Get full text
Get full text
Get full text
Article -
19
Crossover and mutation operators of genetic algorithms
Published 2017“…Genetic algorithms (GA) are stimulated by population genetics and evolution at the population level where crossover and mutation comes from random variables. …”
Get full text
Get full text
Get full text
Article -
20
Fingerprint frontier: the evolution of biometric security
Published 2023“…Chapter Seven, "Best Practice in Fingerprint Security," emerges as a guiding light, delivering complete methods and procedures for developing and maintaining safe fingerprint systems, with a steadfast dedication to not simply identifying issues but also offering answers. …”
Get full text
Get full text
Get full text
Book
