Search Results - (( evolution optimization technology algorithm ) OR ( java implementation a algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3
  4. 4

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The key is the trigger mechanism to the algorithm. Until the advent of the Internet, encryption was rarely used by the public, but was largely a military tool. …”
    Get full text
    Get full text
    Final Year Project
  5. 5
  6. 6

    Optimal placement, sizing and power factor of distributed generation: A comprehensive study spanning from the planning stage to the operation stage by Huy P.D., Ramachandaramurthy V.K., Yong J.Y., Tan K.M., Ekanayake J.B.

    Published 2023
    “…Electric power factor; Electric power transmission networks; Evolutionary algorithms; Optimization; Differential Evolution; Differential evolution algorithms; Distributed generation source; Multiple distributed generations; Optimal allocation; Optimisations; Power factorAbstract; Power system constraints; Distributed power generation; algorithm; distribution system; energy planning; operations technology; optimization…”
    Article
  7. 7
  8. 8
  9. 9
  10. 10

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Optimized differential evolution algorithm for linear frequency modulation radar signal denoising by Al-Dabbagh, Mohanad Dawood Hasan

    Published 2013
    “…The main contention of this thesis is to investigate the development of new optimization technique based on Differential Evolution algorithm (DE), applied for radar signal denoising application. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    Provider independent cryptographic tools by Ibrahim, Subariah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
    Get full text
    Get full text
    Get full text
    Monograph
  15. 15
  16. 16

    Two-stage feature selection using ranking self-adaptive differential evolution algorithm for recognition of acceleration activity by Zainudin, Muhammad Noorazlan Shah, Sulaiman, Md. Nasir, Mustapha, Norwati, Perumal, Thinagaran, Mohamed, Raihani

    Published 2018
    “…An exhaustive searching process of finding an optimal parameter value is another challenge. Consequently, this paper proposes a ranking self-adaptive differential evolution (rsaDE) feature selection algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    Development of an improved GWO algorithm for solving optimal paths in complex vertical farms with multi-robot multi-tasking by Shen, Jiazheng, Hong, Tang Sai, Fan, Luxin, Zhao, Ruixin, Mohd Ariffin, Mohd Khairol Anuar, As’arry, Azizan

    Published 2024
    “…The EPDE-GWO algorithm is compared with Genetic Algorithm (GA), Simulated Annealing (SA), Dung Beetle Optimizer (DBO), and Particle Swarm Optimization (PSO). …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Performance evaluation of real-time multiprocessor scheduling algorithms by Alhussian, H., Zakaria, N., Abdulkadir, S.J., Fageeri, S.O.

    Published 2016
    “…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20