Search Results - (( evolution utilization based algorithm ) OR ( java application interface algorithm ))
Search alternatives:
- evolution utilization »
- utilization based »
- java application »
-
1
Special protection and control scheme based on generation rescheduling using differential evolution and electromagnetism-like algorithm
Published 2016“…The main objective of this research is designing a Special Protection and Control Scheme (SPCS) based on a hybrid approach of combining Differential Evolution (DE) and Electromagnetism-Like algorithms. …”
Get full text
Get full text
Thesis -
2
Real-time algorithmic music composition application.
Published 2022“…In addition, the system also utilises JavaFx and jFugue for its graphical user interface and music programming respectively. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
3
Channel-aware downlink scheduling for quality of service in long term evolution network
Published 2018“…Initially, a range of constraints was defined based on a recent algorithm from the literature, namely Delay Based Weighted Proportional Fair (DBWPF). …”
Get full text
Get full text
Get full text
Thesis -
4
Application-Programming Interface (API) for Song Recognition Systems
Published 2024“…In addition the implementation is done by algorithm using Java’s programming language, executed through an application developed in the Android operating system. …”
Article -
5
Efficient radio resource management algorithms for downlink long term evolution networks
Published 2018“…Our algorithms prolong the battery life by adjusting the base station using initial and final states. …”
Get full text
Get full text
Thesis -
6
Visdom: Smart guide robot for visually impaired people
Published 2025“…The system architecture integrates ROS 2 on a Raspberry Pi, with TCP/IP connectivity enabling remote operation. An Android mobile application, developed using Java and the java.net.Socket library, provides an intuitive and accessible user interface for seamless interaction with the robot. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
7
Visdom: Smart guide robot for visually impaired people
Published 2025“…The system architecture integrates ROS 2 on a Raspberry Pi, with TCP/IP connectivity enabling remote operation. An Android mobile application, developed using Java and the java.net.Socket library, provides an intuitive and accessible user interface for seamless interaction with the robot. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
8
Development Of Machine Learning User Interface For Pump Diagnostics
Published 2022Get full text
Get full text
Monograph -
9
Evolution of RF-signal cognition for wheeled mobile robots using pareto multi-objective optimization
Published 2009“…The elitist Pareto-frontier Differential Evolution (PDE) algorithm is used to generate the Pareto optimal set of ANNs that could optimize two objectives in a single run; (1) maximize the mobile robot homing behavior whilst (2) minimize the hidden neurons involved in the feed-forward ANN. …”
Get full text
Get full text
Get full text
Article -
10
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…A design proposal was outlined to provide an adaptive client/server approach to stream audio contents using Real-Time Transport Protocol (RTP) involving architecture based on the Java Media Framework (JMF) Application Programmable Interfaces (API).RTP protocol is the Internet-standard protocol for the transport of real-time data, including audio and video and can be implemented by using Java Media Framework (JMF). …”
Get full text
Get full text
Thesis -
11
Development of an islanding detection scheme based on combination of slantlet transform and ridgelet probabilistic neural network in distributed generation
Published 2019“…Next, an advanced machine learning based on is utilized to predict islanding and none islanding states. …”
Get full text
Get full text
Thesis -
12
Movie recommendation system / Najwa Syamimie Hasnu
Published 2020Get full text
Get full text
Thesis -
13
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
14
Hybrid Harmony Search Algorithm Integrating Differential Evolution and Lévy Flight for Engineering Optimization
Published 2025“…Harmony search algorithm (HSA) is extensively utilized in engineering optimization. …”
Get full text
Get full text
Get full text
Article -
15
-
16
Adaptive differential evolution algorithm with fitness based selection of parameters and mutation strategies / Rawaa Dawoud Hassan Al-Dabbagh
Published 2015“…Differential evolution (DE) is a simple yet powerful evolutionary algorithm (EA). …”
Get full text
Get full text
Thesis -
17
Hybrid Harmony Search Algorithm Integrating Differential Evolution and Lévy Flight for Engineering Optimization
Published 2025“…Harmony search algorithm (HSA) is extensively utilized in engineering optimization. …”
Get full text
Get full text
Get full text
Article -
18
Performance analyses of adaptive handover decision algorithm using spectrum aggregation in long term evolution - advanced network
Published 2021“…The proposed TVWS algorithm showed average low RLF rate values than the Conventional (CONV) and Multi-Influence Factors Handover Decision Algorithms (MIF-HODA). …”
Get full text
Get full text
Conference or Workshop Item -
19
Hybrid harmony search algorithm integrating differential evolution and lévy flight for engineering optimization
Published 2025“…Harmony search algorithm (HSA) is extensively utilized in engineering optimization. …”
Get full text
Get full text
Get full text
Article -
20
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The application is designed to satisfy the user friendly interfaces and intent to be used by the end user without having the advanced knowledge in mobile security. …”
Get full text
Get full text
Conference or Workshop Item
