Search Results - (( evolution simulation based algorithm ) OR ( java implementation _ algorithm ))
Search alternatives:
- evolution simulation »
- java implementation »
- simulation based »
-
1
Differential evolution optimization algorithm based on generation systems reliability assessment integrated with wind energy
Published 2019Get full text
Get full text
Conference or Workshop Item -
2
RSA Encryption & Decryption using JAVA
Published 2006“…Today, with online marketing, banking, healthcare and other services, even the average householder is aware of encryption. The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
3
-
4
-
5
-
6
The Development Of A Robust Algorithm For Uav Path Planning In 3d Environment
Published 2016“…Significant research has been conducted on Unmanned Aerial Vehicle (UAV) path planning using evolutionary algorithms, such as Particle Swarm Optimization (PSO), Genetic Algorithm (GA), Differential Evolution (DE), and Biogeographic-Based Optimization (BBO). …”
Get full text
Get full text
Thesis -
7
Differential evolution based special protection and control scheme for contingency monitoring of transmission line overloading
Published 2017“…Simulation results for various N − 1 contingency conditions within the considered power system under base case load are proposed and validated with those results from the Genetic Algorithm (GA). …”
Get full text
Get full text
Conference or Workshop Item -
8
Harmonic Elimination Pulse Width Modulation Using Differential Evolution Technique For Three Phase Voltage Source Inverter
Published 2018“…Differential Evolution (DE) has been gaining popularity among researchers as an effective yet simple evolutionary algorithm to solve the optimization problems. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
Provider independent cryptographic tools
Published 2003“…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
Get full text
Get full text
Get full text
Monograph -
10
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
11
Evolution of RF-signal cognition for wheeled mobile robots using pareto multi-objective optimization
Published 2009“…A mobile robot is simulated in a 3D, physics-based environment for the RF-localization behavior. …”
Get full text
Get full text
Get full text
Article -
12
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
13
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
14
A study on channel and delay-based scheduling algorithms for live video streaming in the fifth generation long term evolution-advanced
Published 2022“…This paper will investigate the performance of a number of channel and delay-based scheduling algorithms for an efficient QoS (Quality of Service) provision with more live video streaming users over the Fifth Generation Long-Term Evolution-Advanced (5G LTE-A) network. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
15
Differential Evolution Based Special Protection and Control Scheme for Contingency Monitoring of Transmission Line Overloading
Published 2017“…Simulation results for various N − 1 contingency conditions within the considered power system under base case load are proposed and validated with those results from the Genetic Algorithm (GA). …”
Get full text
Get full text
Get full text
Book Section -
16
-
17
Comparison between scheduling techniques in long term evolution
Published 2013“…The scheduling algorithms performances on the downlink were measured in terms of throughput and block error rate using a MATLAB-based system level simulation. …”
Get full text
Get full text
Get full text
Article -
18
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
Get full text
Get full text
Conference or Workshop Item -
19
Resource allocation in coordinated multipoint long term evolution-advanced networks
Published 2015“…Simulation study shows that the ORA algorithm improves the network sum-rate and fairness index up to 70% and 25%, respectively and reduces the average transmit power by 41% in relative to LRA algorithm. …”
Get full text
Get full text
Thesis -
20
