Search Results - (( evolution optimization choosing algorithm ) OR ( java application matching algorithm ))
Search alternatives:
- evolution optimization »
- optimization choosing »
- application matching »
- choosing algorithm »
- java application »
-
1
-
2
A New Co-Evolution Binary Particle Swarm Optimization With Multiple Inertia Weight Strategy For Feature Selection
Published 2019“…Hence, a new co-evolution binary particle swarm optimization with a multiple inertia weight strategy (CBPSO-MIWS) is proposed in this work. …”
Get full text
Get full text
Get full text
Article -
3
Optimized differential evolution algorithm for linear frequency modulation radar signal denoising
Published 2013“…The main contention of this thesis is to investigate the development of new optimization technique based on Differential Evolution algorithm (DE), applied for radar signal denoising application. …”
Get full text
Get full text
Thesis -
4
An improved method using fuzzy system based on hybrid boahs for phishing attack detection
Published 2022“…The algorithms involved were Genetic Algorithm, Differential Evolution Algorithm, Particle Swarm Optimization, Butterfly Optimization Algorithm, Teaching-Learning-Based Optimization Algorithm, Harmony Search Algorithm and Gravitational Search Algorithm. …”
Get full text
Get full text
Thesis -
5
Efficient radio resource management algorithms for downlink long term evolution networks
Published 2018“…The algorithm is based on the idea of the optimization problem in which resource allocation problem is formulated as an optimization problem. …”
Get full text
Get full text
Thesis -
6
-
7
Adaptive differential evolution algorithm with fitness based selection of parameters and mutation strategies / Rawaa Dawoud Hassan Al-Dabbagh
Published 2015“…Differential evolution (DE) is a simple yet powerful evolutionary algorithm (EA). …”
Get full text
Get full text
Thesis -
8
-
9
-
10
Message based random variable length key encryption algorithm.
Published 2009Get full text
Get full text
Article -
11
Securing cloud data system (SCDS) for key exposure using AES algorithm
Published 2021“…The AES algorithm has its own structure to encrypt and decrypt sensitive data that make the attackers difficult to get the real data when encrypting by AES algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
-
13
An Agent-Based System with Personalization and Intelligent Assistance Services for Facilitating Knowledge Sharing
Published 2006“…The main algorithms used are profile determination and user similarity. …”
Get full text
Get full text
Thesis
