Search Results - (( evolution controlling system algorithm ) OR ( java implementation using algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2
  3. 3

    Provider independent cryptographic tools by Ibrahim, Subariah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
    Get full text
    Get full text
    Get full text
    Monograph
  4. 4

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Differential evolution based special protection and control scheme for contingency monitoring of transmission line overloading by Hadi, Mahmood Khalid, Othman, Mohammad Lutfi, Abdul Wahab, Noor Izzri

    Published 2017
    “…In this paper, a Special Protection and Control Scheme (SPCS) based on Differential Evolution (DE) algorithm for optimal generation rescheduling to mitigate line overloads in contingency conditions has been presented. …”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Differential Evolution Based Special Protection and Control Scheme for Contingency Monitoring of Transmission Line Overloading by Othman, Mohammad Lutfi, Hadi, Mahmood Khalid, Abdul Wahab, Noor Izzri

    Published 2017
    “…In this paper, a Special Protection and Control Scheme (SPCS) based on Differential Evolution (DE) algorithm for optimal generation rescheduling to mitigate line overloads in contingency conditions has been presented. …”
    Get full text
    Get full text
    Get full text
    Book Section
  7. 7

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Efficient radio resource management algorithms for downlink long term evolution networks by Mamman, Maharazu

    Published 2018
    “…Thus, we proposed a call admission control algorithm that admits users to utilize available resources. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Autotuning PID Controllers for Quadplane Hybrid UAV using Differential Evolution Algorithm by Pairan, Mohammad Fahmi, Shamsudin, Syariful Syafiq

    Published 2024
    “…The unified RBF model is then used for autotuning the PID controller using the DE algorithm. The proposed RBF-NN system identification can successfully predict the attitude dynamics of a quadplane in all flight modes with a coefficient of determination of R2 greater than 0.9 and a computing mean time of less than 5 ms. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10
  11. 11

    Autotuning PID Controllers for Quadplane Hybrid UAV using Differential Evolution Algorithm by Pairan, Mohammad Fahmi, Shamsudin, Syariful Syafiq, Yaakub, Mohd Fauzi

    Published 2024
    “…The unified RBF model is then used for autotuning the PID controller using the DE algorithm. The proposed RBF-NN system identification can successfully predict the attitude dynamics of a quadplane in all flight modes with a coefficient of determination of R2 greater than 0.9 and a computing mean time of less than 5 ms. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Identification and predictive control of spray tower system using artificial neural network and differential evolution algorithm by Danzomo, Bashir A., Salami, Momoh Jimoh Eyiomika, Khan, Md. Raisuddin

    Published 2015
    “…This includes the use of an artificial neural network (ANN) based predictive control strategy and differential evolution (DE) optimization algorithm to determines the optimal control signal, uk (liquid droplet size, dD) by minimizing the cost function such that the output is set below the allowable PM concentration. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  13. 13

    Performance evaluation of real-time multiprocessor scheduling algorithms by Alhussian, H., Zakaria, N., Abdulkadir, S.J., Fageeri, S.O.

    Published 2016
    “…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Automatic Number Plate Recognition on android platform: With some Java code excerpts by ., Abdul Mutholib, Gunawan, Teddy Surya, Kartiwi, Mira

    Published 2016
    “…On the other hand, the traditional algorithm using template matching only obtained 83.65% recognition rate with 0.97 second processing time. …”
    Get full text
    Get full text
    Get full text
    Book
  15. 15

    An interactively recurrent functional neural fuzzy network with fuzzy differential evolution and its applications by Cheng, Jian Lin, Chih, Feng Wu, Hsueh, Yi Lin, Cheng, Yi Yu

    Published 2015
    “…Finally, the IRFNFN model and associated FDE learning algorithm were applied to the control system of the water bath temperature and the forecast of the sunspot number. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16
  17. 17

    Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework by Asaad Aref, Ibrahim

    Published 2004
    “…Java Media Framework library and the RTP protocol for audio transmission were used as development tools.The developed system designed in this thesis together with experimental results proved that the system could be implemented successfully. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Investigation and validation of an eleven level symmetric modular multilevel inverter using grey wolf optimization and differential evolution control algorithm for solar PV applica... by Stonier, A.A., Chinnaraj, G., Kannan, R., Mani, G.

    Published 2021
    “…Purpose: This paper aims to examine the design and control of a symmetric multilevel inverter (MLI) using grey wolf optimization and differential evolution algorithms. …”
    Get full text
    Get full text
    Article
  19. 19

    Evolution strategies for evolving artificial neural networks in an arcade game by Tse, Guan Tan, Teo, Jason, Anthony, Patricia

    Published 2010
    “…Pac-man.The resulting algorithm is referred to as an Evolution Strategies Neural Network or ESNet.This study is an attempt to create an autonomous intelligent controller to play the game.The comparison of ESNet with two random systems, Random Direction (RandDir) and Random Neural Network (RandNet) yields promising results.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Control of an inverted pendulum using MODE-based optimized LQR controller by Tijani, Ismaila B., Akmeliawati, Rini, Abdullateef, Ayodele I.

    Published 2013
    “…Hence, a Multiobjective differential evolution algorithm is proposed to design an LQR controller with optimal compromise between the conflicting control objectives. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper