Search Results - (( effective implementation some algorithm ) OR ( java optimization method algorithm ))

Refine Results
  1. 1

    Route Optimization System by Zulkifli, Abdul Hayy

    Published 2005
    “…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
    Get full text
    Get full text
    Final Year Project
  2. 2
  3. 3

    Fuzzy modeling using Bat Algorithm optimization for classification by Noor Amidah, Ahmad Sultan

    Published 2018
    “…In order to solve it, Bat Algorithm method is implement in to optimization method in fuzzy modeling for classification. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  4. 4

    Optimal route checking using genetic algorithm for UiTM's bus services / Tengku Salman Fathi Tengku Jaafar by Tengku Jaafar, Tengku Salman Fathi

    Published 2006
    “…This research study with the development of the Optimal Route Checking Using Genetic Algorithm system should solve this scenario. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Optimize class time tabling by using genetic algorithm technique in UTHM by Ahmad, Izah Rafidah

    Published 2019
    “…This research used genetic algorithm (GA) that was applied to java programming languages with a goal of reducing conflict and optimizing the fitness. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Features selection process can be considered a problem of global combinatorial optimization in machine learning. Genetic algorithm GA had been adopted to perform features selection method; however, this method could not deliver an acceptable detection rate, lower accuracy, and higher false alarm rates. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Comparison of performances of Jaya Algorithm and Cuckoo Search algorithm using benchmark functions by Ahmed, Mashuk, Nasser, Abdullah B., Kamal Z., Zamli, Heripracoyo, Sulistyo

    Published 2022
    “…Metaheuristic algorithms have been used successfully for solving different optimization problems. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    An ensemble learning method for spam email detection system based on metaheuristic algorithms by Behjat, Amir Rajabi

    Published 2015
    “…Feature subset selection and classifier ensemble learning are familiar techniques with high ability to optimize above problems. Recently, various techniques based on different algorithms have been developed. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Security analysis of blowfish algorithm by Alabaichi, Ashwak Mahmood, Ahmad, Faudziah, Mahmod, Ramlan

    Published 2013
    “…C++ is used in the implementation of the blowfish algorithm; MATLAB programming (Mathworks, R., 2012a) is used in the implementation of avalanche effect and correlation coefficient.…”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Web-based expert system for material selection of natural fiber- reinforced polymer composites by Ahmed Ali, Basheer Ahmed

    Published 2015
    “…An inappropriate selection of materials for engineering component would result in entire product failure which ultimately has a negative impact on the society. Several algorithms, methods and spreadsheets are being proposed by various researchers in this field to improve materials selection. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    VITILIGO LESION ASSESSMENT TOOL ON SMARTPHONE by BORETSKAYA, VIKTORIYA

    Published 2013
    “…For example in England, there are eight million people having skin disorder problems [16]. The effectiveness of a treatment depends on the type of the skin disorder, as some disorders can be easily managed by creams and ointments and some need long-term treatments. …”
    Get full text
    Get full text
    Final Year Project
  15. 15

    Security analysis of blowfish algorithm by Al-Abiachi, Ashwak M., Ahmad, Faudziah, Mahmod, Ramlan

    Published 2013
    “…The results obtained from the analysis of correlation coefficient showed that Blowfish algorithm gives a good nonlinear relation between plaintext and ciphertext while the results of avalanche effect indicate that the algorithm presents good avalanche effect from the second round.C++ is used in the implementation of the blowfish algorithm; MATLAB programming (Mathworks, R., 2012a) is used in the implementation of avalanche effect and correlation coefficient.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    A Comparative Study Of Blockchain Algorithms For Non-Fungible Token by Woo, Jan Yin

    Published 2023
    “…The most important issue that is compulsory to overcome is the performance of blockchain algorithms in NFTs and the effect of scalability in each blockchain algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  17. 17
  18. 18

    Sequential and parallel multiple tabu search algorithm for multiobjective urban transit scheduling problems by Uvaraja, Vikneswary

    Published 2018
    “…Additionally, the MTS algorithm is also implemented in parallel computing to produce parallel MTS for generating comparable solutions in shorter computational times. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Enhancement Of Wifi Indoor Positioning System by Aboodi, Ahed Hussein

    Published 2011
    “…Some experiments were performed in the School of Computer Sciences in Universiti Sains Malaysia before implementing the proposed algorithm. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Fuzzy modeling of brain tissues in Bayesian segmentation of brain MR images by Farzan, Ali, Ramli, Abdul Rahman, Mashohor, Syamsiah, Mahmud, Rozi

    Published 2010
    “…Results show that our algorithm performs well in comparison with the one implemented in SPM. …”
    Get full text
    Get full text
    Conference or Workshop Item