Search Results - (( development policy function algorithm ) OR ( java application customization algorithm ))
Search alternatives:
- customization algorithm »
- development policy »
- function algorithm »
- java application »
- policy function »
-
1
Optimized processing of satellite signal via evolutionary search algorithm
Published 2000“…The PRSS algorithm is an adaptive search technique that can learn a high performance knowledge structure in reactive environments that provide information as an objective function. …”
Get full text
Get full text
Article -
2
-
3
Optimization of exclusive release policies for hydropower reservoir operation by using genetic algorithm
Published 2016“…Meanwhile, to determine the optimal operation of each policy, real coded genetic algorithm is applied as an optimization technique and maximizing the total power generation over the operational periods is chosen as an objective function. …”
Get full text
Get full text
Get full text
Article -
4
Stochastic optimal control of economic growth model under research and development investment with Kalman filtering approaches
Published 2022“…The optimal control policy is designed to minimize the cost function. …”
Get full text
Get full text
Article -
5
A Toolkit for Simulation of Desktop Grid Environment
Published 2014“…Core functionality of the simulator are job generation, volunteer generation, simulating algorithms, generating graphical charts and generating reports. …”
Get full text
Get full text
Final Year Project -
6
A hybrid model of system dynamics and genetic algorithm to increase crude palm oil production in Malaysia
Published 2018“…In this research, a hybrid model of system dynamics (SD) and genetic algorithm (GA) was developed to determine the optimal policy in increasing the CPO production in Malaysia. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Optimization of hydropower reservoir system using genetic algorithm for various climatic scenarios
Published 2015“…To determine the optimum solution in each policy, real coded genetic algorithm is used as an optimization technique. …”
Get full text
Get full text
Get full text
Thesis -
8
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
9
Reinforcement learning-based target tracking for unmanned aerial vehicle with achievement rewarding and multistage traning
Published 2022“…Fifth, a novel agent selection algorithm was developed to enable the selection of the best agent and avoid under-fitting and over-fitting. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
Twin delayed deep deterministic policy gradient-based target tracking for unmanned aerial vehicle with achievement rewarding and multistage training
Published 2022“…Second, a novel reward formulation for the UAV-based target tracking enabled a careful combination of the various dynamic variables in the reward functions. This was accomplished by incorporating two exponential functions to limit the effect of velocity and acceleration to prevent the deformation in the policy function approximation. …”
Get full text
Get full text
Get full text
Article -
11
Optimization and selection of maintenance policies in an electrical gas turbine generator based on the hybrid reliability-centered maintenance (RCM) model
Published 2020“…Hence, in the present study, a hybrid RCM model was proposed to fill these gaps and find the optimal maintenance policies and scheduling by a combination of hybrid linguistic-failure mode and effect analysis (HL-FMEA), the co-evolutionary multi-objective particle swarm optimization (CMPSO) algorithm, an analytic network process (ANP), and developed maintenance decision tree (DMDT). …”
Get full text
Get full text
Get full text
Article -
12
Performance Analysis Of Different Hash Functions Using Bloom Filter For Network Intrusion Detection Systems In 32-Bit And 64-Bit Computer Operation Mode.
Published 2016“…A Bloom Filter pattern matching algorithm with fast hashing functions is developed for 32-bit and 64-bit computer system. …”
Get full text
Get full text
Thesis -
13
Effective downlink resource management for wimax networks
Published 2018“…Our EDRM framework involves three functions: Class-Based Scheduling (CBS) algorithm, Dynamic Bandwidth Allocation (DBA) scheme and Link Session Management (LSM) policy. …”
Get full text
Get full text
Thesis -
14
Passive congregation theory for particle swarm optimization (PSO): An application in reservoir system operation
Published 2023“…The passive congregation theory of natural being's social behaviour is adopted to updated the standard PSO algorithm and used to develop and optimise a reservoir release policy for monthly basis. …”
Article -
15
Controller placement problem in the optimization of 5G based SDN and NFV architecture
Published 2021“…A heuristic called dynamic mapping and multi-stage CPP algorithm (DMMCPP) was developed to solve CPP as resource allocation in a distributed 5G-SDN-NFV-based network. …”
Get full text
Get full text
Thesis -
16
Development of reliability-centered maintenance model using linguistic failure mode and effect analysis
Published 2019“…An analytic network process (ANP) and a developed maintenance decision tree (DMDT) were used to find the optimal maintenance policy and schedule for every FMs. …”
Get full text
Get full text
Thesis -
17
Forecasting hydrological parameters for reservoir system utilizing artificial intelligent models and exploring their influence on operation performance
Published 2019“…Several research efforts have been developed to generate optimal operation rules for dam and reservoir systems utilizing different optimization algorithms. …”
Get full text
Get full text
Article -
18
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Adaptive genetic algorithm to improve negotiation process by agents e-commerce
Published 2011“…The proposed negotiation algorithm employs Bayesian learning and similarity functions in order to predict opponent agent’s type and preferences. …”
Get full text
Get full text
Thesis -
20
Humanizing AI in Higher Education: Rethinking HR, Ethics, and Skill Development for University Employees in the SDG Era
Published 2025“…Based on these findings, the paper proposes a Humanizing AI in Higher Education Framework focusing on ethical accountability, diversified HR policies, and continuous professional learning, aligned with the United Nations Sustainable Development Goals (SDG 4 - Quality Education, SDG 8 - Decent Work, and SDG 16 - Peace, Justice, and Strong Institutions). …”
Get full text
Get full text
Get full text
Get full text
Article
