Search Results - (( evolution simulation approach algorithm ) OR ( java implementation _ algorithm ))

Refine Results
  1. 1

    Queen-bee evolution approach to prc-based papr reduction for ofdm systems by Laila, Binti Abg Ahmad

    Published 2011
    “…The thesis proposed the adoption of Queen-bee Evolution approach for Genetic Algorithm (QBEGA) concept to improve the Genetic Algorithm for generating suboptimum peak reduction carriers (PRCs) for the orthogonal frequency division multiplexing (OFDM) systems employing a large number of sub-channels as contributed by Tan (2003a). …”
    Get full text
    Get full text
    Thesis
  2. 2

    Differential evolution technique of HEPWM for three-phase voltage source inverter by Azziddin, Mohamad Razali, Kamisman, Norazelina, Jurifa, Mat Lazi, Bahari, Norhazilina

    Published 2016
    “…This paper presents the execution of Differential Evolution (DE) algorithm in order to understand the principle operation of Harmonic Elimination Pulse-Width Modulation (HEPWM) switching technique. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…Today, with online marketing, banking, healthcare and other services, even the average householder is aware of encryption. The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  4. 4

    Harmonic Elimination Pulse Width Modulation Using Differential Evolution Technique For Three Phase Voltage Source Inverter by Kamisman, Norazelina

    Published 2018
    “…Explanation of DE algorithm execution is given, and the best approach of mutation strategy selection used in DE has been investigated. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Resource allocation in coordinated multipoint long term evolution-advanced networks by Katiran, Norshidah

    Published 2015
    “…Simulation study shows that the ORA algorithm improves the network sum-rate and fairness index up to 70% and 25%, respectively and reduces the average transmit power by 41% in relative to LRA algorithm. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Evolution of RF-signal cognition for wheeled mobile robots using pareto multi-objective optimization by Chin, Kim On, Teo, Jason Tze Wi

    Published 2009
    “…This article describes a simulation model in which a multi-objective approach is utilized for evolving an artificial neural networks (ANNs) controller for an autonomous mobile robot. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Provider independent cryptographic tools by Ibrahim, Subariah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
    Get full text
    Get full text
    Get full text
    Monograph
  8. 8

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Evolving controllers for simulated car racing using differential evolution by Shi, Jun Long, Chin, Kim On, Teo, Jason Tze Wi, Tan, Tse Guan, Rayner Alfred, Patricia Anthony

    Published 2013
    “…The Differential Evolution (DE) algorithm is combined with Feed-forward Artificial Neural Networks (FFANNs) to generate the required intelligent controllers in a well-known car racing game, namely The Open Racing Car Simulator (TORCS). …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    HEPWM using differential evolution technique for three phase voltage source inverter by Azziddin, Mohamad Razali, Kamisman, Norazelina, Mat Lazi, Jurifa, Bahari, Norhazilina

    Published 2016
    “…This paper presents the implementation of Differential Evolution (DE) algorithm to solve Harmonic Elimination Pulse-Width Modulation (HEPWM) problem. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Development of a Bioinspired optimization algorithm for the automatic generation of multiple distinct behaviors in simulated mobile robots by Hanafi Ahmad Hijazi, Patricia Anthony

    Published 2006
    “…This research explores a new approach of using a multi-objective evolutionary algorithm (MOEA) to evolve robot controllers in performing phototaxis tasks while avoiding obstacles in a simulated 30 physics environment, to overcome problems involving more than one objective, where these objectives usually trade-off among each other and are expressed in different units. …”
    Get full text
    Get full text
    Research Report
  16. 16

    Performance evaluation of real-time multiprocessor scheduling algorithms by Alhussian, H., Zakaria, N., Abdulkadir, S.J., Fageeri, S.O.

    Published 2016
    “…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Investigation and validation of an eleven level symmetric modular multilevel inverter using grey wolf optimization and differential evolution control algorithm for solar PV applica... by Stonier, A.A., Chinnaraj, G., Kannan, R., Mani, G.

    Published 2021
    “…Purpose: This paper aims to examine the design and control of a symmetric multilevel inverter (MLI) using grey wolf optimization and differential evolution algorithms. Design/methodology/approach: The optimal modulation index along with the switching angles are calculated for an 11 level inverter. …”
    Get full text
    Get full text
    Article
  18. 18

    Evolution strategy for collaborative beamforming in wireless sensor networks by Wong, Chen How

    Published 2013
    “…Evaluations have been carried out through simulation and result show that the performance using ES is improved by 18.7 % convergence speed as compared to the conventional one-bit feedback (C1BF) approach. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    Automatic Number Plate Recognition on android platform: With some Java code excerpts by ., Abdul Mutholib, Gunawan, Teddy Surya, Kartiwi, Mira

    Published 2016
    “…The main challenges of implementing ANPR algorithm on mobile phone are how to produce a higher coding efficiency, lower computational complexity, and higher scalability. …”
    Get full text
    Get full text
    Get full text
    Book