Search Results - (( evolution integration case algorithm ) OR ( java implementation during algorithm ))

  • Showing 1 - 19 results of 19
Refine Results
  1. 1
  2. 2

    Pairwise testing tools based on hill climbing algorithm (PTCA) by Lim, Seng Kee

    Published 2014
    “…The actual implementation of the algorithm which is in Java programming language, the program is implemented on Net Bean 7.0.1. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  3. 3

    Dual optimization approach in discrete Hopfield neural network by Guo, Yueling, Zamri, Nur Ezlin, Mohd Kasihmuddin, Mohd Shareduwan, Alway, Alyaa, Mansor, Mohd. Asyraf, Li, Jia, Zhang, Qianhong

    Published 2024
    “…Therefore, this research contributes to the improvement of the learning and retrieval phases by integrating the Hybrid Differential Evolution Algorithm and Swarm Mutation respectively. …”
    Get full text
    Get full text
    Article
  4. 4

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…The circuits have been designed by proteus, the microcontrollers have been programmed by micro C, and the Graphical User Interface (GUI) has been implemented in Java. Few by electronic components such as RFID, multiplexer, XBee, and servo motors have been used to realize the system. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Omega grey wolf optimizer (ωGWO) for optimization of overcurrent relays coordination with distributed generation by Noor Zaihan, Jamal

    Published 2019
    “…The ωGWO is then implemented to the realdistribution network with the distributed generation (DG) in order to investigate the drawbacks of the DG insertion towards the original overcurrent relays configuration setting. The GWO algorithm is tested to four different test cases which are IEEE 3 bus (consists of six OCRs), IEEE 8 bus (consists of 14 OCRs), 9 bus (consists of 24 OCRs) and IEEE 15 bus (consists of 42 OCRs) test systems with normal inverse (NI) characteristic curve for all test cases and very inverse (VI) curve for selected cases to test the flexibility of the GWO algorithm. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  7. 7

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…The system is capable in operating an off-line programming method, starting from its programming sequences until robotic implementation of the program. During early stages, the research is emphasis more towards designing a robotic system using RoboLab software and C++ programming language. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Data Hiding Techniques In Digital Images by Al Thloothi, Salah Ramadan

    Published 2003
    “…After all these studies, one of the algorithms in the masking technique is developed and implemented using JAVA program to embed message into true color image with a good quality and higher capacity. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Multi-floor indoor location estimation system based on wireless local area network by Chua, Tien Han

    Published 2007
    “…Before developing the system, study on characteristics of RSS is conducted to help the design, development and implementation of the proposed system. The proposed system is then designed and developed using Java programming language. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Human activity recognition via accelerometer and gyro sensors by Tee, Jia Lin

    Published 2023
    “…To prevent overfitting, early stopping is used to monitor validation loss during training and dropout rate of 0.3 are applied. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  14. 14

    Modelling and simulation of drying process for ceramic membrane fabrication by Ong, Tze Ching

    Published 2015
    “…In fact, the drying process is one of the longest steps corresponding to various evolutions of parameters during the evaporation process. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions by Saraswati, Galuh Wilujeng

    Published 2017
    “…The project has also implemented the optimization process onto the proposed ANFIS model through the hybrid of Genetic Algorithm on the fuzzy membership function of the ANFIS model. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Application of data mining techniques for economic evaluation of air pollution impact and control by Lukman, Iing

    Published 2007
    “…Data mining techniques applied in this thesis were: 1) Group method of data handling (GMDH), originally from engineering, introducing principles of evolution - inheritance, mutation and selection - for generating a network structure systematically to develop the automatic model, synthesis, and its validation; 2) The weighted least square (WLS) and step wise regression were also applied for some cases; 3) The classification-based association rules were applied. …”
    Get full text
    Get full text
    Thesis
  17. 17

    The duality of technological innovation and dynamic capabilities: the micro-foundation of China's construction machinery industry's rise up the global value chain by Xia, Weifu, Alwie, Aryaty, Taasim, Shairil Izwan, Jin, Wong Tze, Naning, Fatin Hana

    Published 2024
    “…Future research can further explore the long-term evolution path of technological innovation duality and its differences in cross-cultural contexts.…”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Evaluation of cloud 3D printing services oriented toward the product life cycle based on a triangular fuzzy number complementary judgment matrix by Zhang, Chenglei, Li, Xiaoqian, Liu, Jiajia, Zhang, Yuanming, Zainudin, Edi Syams, Xu, Bo, Zhou, Sheng Fei, As’arry, Azizan Bin, Ismai, Mohd Idris Shah

    Published 2024
    “…The rationality and efficacy of our research methodology are scrupulously validated through a meticulously designed series of case studies. Notably, the fuzzy analytic hierarchy process (FAHP) algorithm, a core component of our approach, has demonstrated exceptional problem-solving capabilities and unparalleled optimization of performance. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Evolutionary cost-cognizant regression test case prioritization for object-oriented programs by Bello, AbdulKarim

    Published 2019
    “…To improve the rate of fault detection during several TCP approaches are proposed for regression testing. …”
    Get full text
    Get full text
    Thesis