Search Results - (( evolution optimization modified algorithm ) OR ( java implementation level algorithm ))

Refine Results
  1. 1

    A new modified differential evolution algorithm scheme-based linear frequency modulation radar signal de-noising by Al-Dabbagh, Mohanad Dawood, Al-Dabbagh, Rawaa Dawoud, Raja Abdullah, Raja Syamsul Azmir, Hashim, Fazirulhisyam

    Published 2015
    “…A modified crossover scheme called rand-length crossover was designed to fit the proposed variable-length DE, and the new DE algorithm is referred to as the random variable-length crossover differential evolution (rvlx-DE) algorithm. …”
    Get full text
    Get full text
    Article
  2. 2

    Application of swarm intelligence optimization on bio-process problems / Mohamad Zihin Mohd Zain by Mohamad Zihin , Mohd Zain

    Published 2018
    “…This modified algorithm called Modified Multi-Objective Particle Swarm Optimization (M-MOPSO) employs a fixed-sized external archive along with a dynamic boundary-based search mechanism to evolve the population. …”
    Get full text
    Get full text
    Thesis
  3. 3

    A refined differential evolution algorithm for improving the performance of optimization process by A. R., Yusoff, Nafrizuan, Mat Yahya

    Published 2011
    “…Various Artificial Intelligent (AI) algorithms can be applied in solving optimization problems. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Improved chemotaxis differential evolution optimization algorithm by Yıldız, Y. Emre, Altun, Oğuz, Topal, A. Osman

    Published 2015
    “…The social foraging behavior of Escherichia coli has recently received great attention and it has been employed to solve complex search optimization problems.This paper presents a modified bacterial foraging optimization BFO algorithm, ICDEOA (Improved Chemotaxis Differential Evolution Optimization Algorithm), to cope with premature convergence of reproduction operator.In ICDEOA, reproduction operator of BFOA is replaced with probabilistic reposition operator to enhance the intensification and the diversification of the search space.ICDEOA was compared with state-of-the-art DE and non-DE variants on 7 numerical functions of the 2014 Congress on Evolutionary Computation (CEC 2014). …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Broadening selection competitive constraint handling algorithm for faster convergence by Shaikh, T.A., Hussain, S.S., Tanweer, M.R., Hashmani, M.A.

    Published 2020
    “…In this study, the BSCCH algorithm has been coupled with Differential Evolution algorithm as a proof of concept because it is found to be an efficient algorithm in the literature for constrained optimization problems. …”
    Get full text
    Get full text
    Article
  6. 6

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…The encryption algorithms are playing an important part in the protection level for data. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Multiple Objective Optimization of Green Logistics Using Cuckoo Searching Algorithm by Wang, Wei, Liu, Yao

    Published 2016
    “…In this paper, a modified Cuckoo searching algorithm is proposed to solve the multiple objective Green Logistics optimization problem. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Self-configured link adaptation using channel quality indicator-modulation and coding scheme mapping with partial feedback for green long-term evolution cellular systems by Salman, Mustafa Ismael

    Published 2015
    “…To achieve this objective, an iterative approach based on swarm intelligence is used to find the optimal CQI threshold at which the competing criteria are optimized. …”
    Get full text
    Get full text
    Thesis
  9. 9

    A centralized localization algorithm for prolonging the lifetime of wireless sensor networks using particle swarm optimization in the existence of obstacles by Abdulhasan Al-Jarah, Ali Husam

    Published 2017
    “…So, the travelling distance, power consumption and lifetime of the network will be calculated in both cases for original algorithm and modified algorithm, which is a modified deployment algorithm, and compared between them. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    A multi-objective particle swarm optimization algorithm based on dynamic boundary search for constrained optimization by Mohd Zain, Mohamad Zihin, Kanesan, Jeevan, Chuah, Joon Huang, Dhanapal, Saroja, Kendall, Graham

    Published 2018
    “…M-MOPSO is compared with four other algorithms namely, MOPSO, Multi-Objective Grey Wolf Optimizer (MOGWO), Multi-Objective Evolutionary Algorithm based on Decompositions (MOEA/D) and Multi-Objective Differential Evolution (MODE). …”
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  13. 13

    Autotuning PID Controllers for Quadplane Hybrid UAV using Differential Evolution Algorithm by Pairan, Mohammad Fahmi, Shamsudin, Syariful Syafiq

    Published 2024
    “…By iteratively modifying the control settings to achieve optimal performance, the DE algorithm replaces the requirement for manual PID tuning, which can be time-consuming and suboptimal. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Autotuning PID Controllers for Quadplane Hybrid UAV using Differential Evolution Algorithm by Pairan, Mohammad Fahmi, Shamsudin, Syariful Syafiq, Yaakub, Mohd Fauzi

    Published 2024
    “…By iteratively modifying the control settings to achieve optimal performance, the DE algorithm replaces the requirement for manual PID tuning, which can be time-consuming and suboptimal. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter by Azhar, Nur Huwaina

    Published 2019
    “…It does not consider the LACE algorithm implemented in huge number of server in one Cloud datacenter. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17
  18. 18

    A Model for Evaluation of Cryptography Algorithm on UUM Portal by Norliana, Abdul Majid

    Published 2004
    “…Level one is the development of userID and password, level two involve the insertion of the testing parameter speed coding. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…Performance Testing is used to test the performance of algorithm implementations in applications. The test results show that the Boyer Moore and Knuth Morris Pratt algorithms have an accuracy rate of 100%, and the Horspool algorithm 85.3%. …”
    Get full text
    Get full text
    Journal
  20. 20

    An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe by Yakub Kayode, Saheed, Kazeem Alagbe, Gbolagade

    Published 2017
    “…We use a parallel technique that divides RSA power process into seperate threads and employs the use of Chinese Remainder Theorem (CRT) to decrease the time required for both encryption and decryption operation. Java programming language is used to implement the algorithm. …”
    Get full text
    Get full text
    Get full text
    Article