Search Results - (( evolution optimization parallel algorithm ) OR ( java detection system algorithm ))
Search alternatives:
- evolution optimization »
- optimization parallel »
- system algorithm »
- java detection »
-
1
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
2
Optimization of extractive Automatic Text Summarization using Decomposition-based Multi-objective Differential Evolution and parallelization
Published 2024“…The central challenge in Automatic Text Summarization (ATS) is efficiently generating machine-generated text summaries through optimization algorithms, a critical component for systems dealing with textual information processing. …”
Get full text
Get full text
Get full text
Thesis -
3
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013“…The experimental results show that the blood vessel detection system has worked well in the ARM platform with the Android OS. …”
Get full text
Get full text
Conference or Workshop Item -
4
PMT : opposition based learning technique for enhancing metaheuristic algorithms performance
Published 2020“…To evaluate the PMT’s performance and adaptability, the PMT was applied to four contemporary metaheuristic algorithms, Differential Evolution, Particle Swarm Optimization, Simulated Annealing, and Whale Optimization Algorithm, to solve 15 well-known benchmark functions as well as 2 real world problems based on the welded beam design and pressure vessel design. …”
Get full text
Get full text
Thesis -
5
PMT: opposition-based learning technique for enhancing meta-heuristic performance
Published 2019“…To evaluate the PMT's performance and adaptability, the PMT has been applied to four contemporary meta-heuristic algorithms, differential evolution (DE), particle swarm optimization (PSO), simulated annealing (SA), and whale optimization algorithm (WOA), to solve 15 well-known benchmark functions. …”
Get full text
Get full text
Get full text
Article -
6
OPTIMIZATION OF HYBRID-FUZZY CONTROLLER FOR SERVOMOTOR CONTROL USING A MODIFIED GENETIC ALGORITHM
Published 2011“…In this thesis, a new optimization GA-based algorithm that emanates from modification of conventional GA to reduce the iterations number and the duration time, namely, semi-parallel operation genetic algorithm (SPOGA) is proposed. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Application Of Genetic Algorithms For Robust Parameter Optimization
Published 2010“…Genetic algorithms (GA) are fairly recent in this respect but afford a novel method of parameter optimization. …”
Get full text
Get full text
Article -
8
Artificial neural network learning enhancement using Artificial Fish Swarm Algorithm
Published 2011“…Artificial Neural Network (ANN) is a new information processing system with large quantity of highly interconnected neurons or elements processing parallel to solve problems.Recently, evolutionary computation technique, Artificial Fish Swarm Algorithm (AFSA) is chosen to optimize global searching of ANN.In optimization process, each Artificial Fish (AF) represents a neural network with output of fitness value.The AFSA is used in this study to analyze its effectiveness in enhancing Multilayer Perceptron (MLP) learning compared to Particle Swarm Optimization (PSO) and Differential Evolution (DE) for classification problems.The comparative results indeed demonstrate that AFSA show its efficient, effective and stability in MLP learning.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…An Intrusion Detection System is software or application which is used to detect thread, malicious activities and the unauthorized access to the computer system and warn the administrators by generating alarms. …”
Get full text
Get full text
Thesis -
10
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…A GUI is created in a form of JAVA application to display data detected from tag. …”
Get full text
Get full text
Thesis -
11
Detection and extraction features for signatures images via different techniques
Published 2019Get full text
Get full text
Conference or Workshop Item -
12
Text steganalysis using evolution algorithm approach
Published 2012“…This study presents a new alternative of steganalysis method in order to detect hidden messages in text steganalysis called Evolution Detection Steganalysis System (EDSS) based on the evolution algorithm approach under Java Genetic Algorithms Package (JGAP). …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
14
-
15
-
16
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…A robotic hardware system has been developed using LEGO Mindstorm kit. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Visualisation tool to study malaria transmission using network modelling
Published 2014“…Java was used to implement the visualisation tool. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
18
Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
Published 2009“…The system includes two main functions; first is the hiding of the information in unused area 2 of PE-file (.EXE file), through the execution of four process (specify the cover file, specify the information file, encryption of the information, and hiding the information) and the second function is the extraction of the hiding information through three process (specify the steno file, extract the information, and decryption of the information) and The proposed system is implemented by using java.…”
Get full text
Get full text
Get full text
Article -
19
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
Get full text
Get full text
Get full text
Academic Exercise -
20
An enhancement of multi-factor weighted approach technique in prioritizing test cases by comparing similarity distance
Published 2025“…Traditionally, techniques rely on source code or a specification for the tested system. Therefore, numerous factors and techniques have been used to optimize the prioritization process. …”
Get full text
Get full text
Get full text
Article
