Search Results - (( development theory optimization algorithm ) OR ( java data function algorithm ))
Search alternatives:
- theory optimization »
- development theory »
- function algorithm »
- data function »
- java »
-
1
Fuzzy modeling using Bat Algorithm optimization for classification
Published 2018“…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
2
Design and development of optimal path trace back using graph theory technique for accelerate DNA sequence alignment accelerator: article
Published 2010“…The Smith-Waterman is been simplified into four modules which were initialization, score calculation, matrix filling and optimal path. The scope of the paper based on optimal path trace back using graph theory. …”
Get full text
Get full text
Article -
3
Design and development of optimal path trace back using graph theory technique for accelerate DNA sequence alignment accelerator
Published 2010“…The Smith-Waterman is been simplified into four modules which were initialization, score calculation, matrix filling and optimal path. The scope of the paper based on optimal path trace back using graph theory. …”
Get full text
Get full text
Student Project -
4
Integrated optimal control and parameter estimation algorithms for discrete-time nonlinear stochastic dynamical systems
Published 2011“…The algorithm developed in this thesis contains three sub-algorithms. …”
Get full text
Get full text
Thesis -
5
The effect of GA parameters on the performance of GA-based QoS routing algorithm
Published 2023“…Genetic algorithm (GA) is a powerful search and optimization algorithm inspired by the theory of genetics and natural selection. …”
Conference paper -
6
-
7
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
Optimal design of three-phase static var compensation system
Published 2023“…The performance of the system has been compared with SVC system based on instantaneous active-reactive power theory. The paper exhibits unnecessary complexity involved in control algorithms other than SDM. � 2012 IEEE.…”
Conference paper -
9
A filtering algorithm for efficient retrieving of DNA sequence
Published 2009Get full text
Get full text
Get full text
Article -
10
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
11
Power system intentional islanding for different contingency scenarios using discrete optimization technique
Published 2023“…The initial intentional islanding solution was determined using graph theory approach, to facilitate the proposed MDEP algorithm in determining the optimal intentional islanding strategy. …”
text::Thesis -
12
Power system stabilization based on artificial intelligent techniques: a review
Published 2009“…This paper reviews new approaches in modern research using Artificial Intelligent (AI) techniques to develop power system stabilizer (PSS). These techniques are Artificial Neural Network (ANN), fuzzy logic, hybrid artificial intelligent, expert systems, and optimization techniques base AI such as Genetic Algorithm (GA), Particle Swarm Optimization (PSO), Tabu Search (TS) algorithm, etc. …”
Get full text
Conference or Workshop Item -
13
-
14
Nonlinear convergence algorithm: structural properties with doubly stochastic quadratic operators for multi-agent systems
Published 2018“…We develop two algorithms: 1) the nonlinear algorithm of extreme doubly stochastic quadratic operator (NLAEDSQO) to generate all the convergent EDSQOs and 2) the nonlinear convergence algorithm (NLCA) of EDSQOs to investigate the optimal consensus for MAS. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
15
-
16
Efficient transmission based on genetic evolutionary algorithm
Published 2022“…Through the simulation of the transmission performance of genetic optimization algorithm, the comparison of transmission energy consumption between GA and evolutionary algorithm is analyzed, and the evolutionary algorithm with higher transmission performance is obtained. …”
Get full text
Get full text
Get full text
Get full text
Proceedings -
17
Electricity Price Prediction with Support Vector Machine and Bacterial Foraging Optimization Algorithm for Day-Ahead model
Published 2023Conference Paper -
18
Web-based RIG performance reporting system using interactive visualization techniques / Amir Hambaly Nasaruddin
Published 2019“…For the user to analyze the result, the system provides visual analytics technique which can educate the user on analyzing the result which is drill down and sorting function to educate users. The result of this project is all algorithm for visualizing data is functioning and the output produced from the system is correct and effective. …”
Get full text
Get full text
Thesis -
19
Energy-efficient power allocation for downlink non orthogonal multiple access networks based on game theory and genetic algorithm / Reem Mustafa Mah’d Al Debes
Published 2025“…The research leverages Artificial Intelligence (AI)-based Genetic Algorithms (GA) and game theory to address critical challenges in resource allocation. …”
Get full text
Get full text
Get full text
Thesis -
20
Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
Published 2009“…The system includes two main functions; first is the hiding of the information in unused area 2 of PE-file (.EXE file), through the execution of four process (specify the cover file, specify the information file, encryption of the information, and hiding the information) and the second function is the extraction of the hiding information through three process (specify the steno file, extract the information, and decryption of the information) and The proposed system is implemented by using java.…”
Get full text
Get full text
Get full text
Article
