Search Results - (( evolution utilization model algorithm ) OR ( java implementation some algorithm ))
Search alternatives:
- evolution utilization »
- java implementation »
- implementation some »
- utilization model »
- model algorithm »
- some algorithm »
-
1
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
2
-
3
-
4
-
5
A New Hybrid K-Means Evolving Spiking Neural Network Model Based on Differential Evolution
Published 2018“…Various UCI machine learning data sets have been utilized for evaluating the performance of this model. …”
Get full text
Get full text
Get full text
Book Chapter -
6
Route Optimization System
Published 2005“…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
Get full text
Get full text
Final Year Project -
7
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…It is shown that the implementation of AES encryption algorithm is capable to secure data stored in HDFS to some extent.…”
Get full text
Get full text
Conference or Workshop Item -
8
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…It is shown that the implementation of AES encryption algorithm is capable to secure data stored in HDFS to some extent.…”
Get full text
Get full text
Conference or Workshop Item -
9
A holistic review on artificial intelligence techniques for well placement optimization problem
Published 2020“…Nature-inspired gradient-free optimization algorithms like particle swarm optimization, genetic algorithm, covariance matrix adaptation evolution strategy and differential evolution have been utilized in this area. …”
Get full text
Get full text
Article -
10
Evolution of RF-signal cognition for wheeled mobile robots using pareto multi-objective optimization
Published 2009“…This article describes a simulation model in which a multi-objective approach is utilized for evolving an artificial neural networks (ANNs) controller for an autonomous mobile robot. …”
Get full text
Get full text
Get full text
Article -
11
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
12
Dual optimization approach in discrete Hopfield neural network
Published 2024“…Quantitative evaluations show that the proposed model successfully enhances the optimization of both phases, ranking first compared to 10 recent algorithms for all metrics. …”
Get full text
Get full text
Article -
13
Fuzzy modeling using Bat Algorithm optimization for classification
Published 2018“…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
14
Performances Of Metaheuristic Algorithms In Optimizing Tool Capacity Allocations
Published 2014“…In this research, the algorithms studied includes Genetic Algorithm, Particle Swarm Optimization Algorithm, Differential Evolution Algorithm, Harmony Search Algorithm, Teaching-LearningBased Optimization Algorithm and Black Hole Algorithm. …”
Get full text
Get full text
Thesis -
15
Implementation of RIO in UMJaNetSim / Chan Chin We
Published 2004“…In this project, I will do some research on the recent TCP congestion control and avoidance mechanisms and implement one of the mechanisms into the Java Network Simulator (JaNetSim). …”
Get full text
Get full text
Thesis -
16
An FPGA implementation of exp-bet scheduling algorithm in LTE networks / Yusmardiah Yusuf
Published 2017“…It is performed by the scheduling algorithm implemented in the Long Term Evolution (LTE) base station, Evolved Node B. …”
Get full text
Get full text
Thesis -
17
Comparison of performances of Jaya Algorithm and Cuckoo Search algorithm using benchmark functions
Published 2022“…This paper aims to compare the performance of two metaheuristic algorithms which are Jaya Algorithm (JA) and Cuckoo Search (CS) using some common benchmark functions. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
A review on object detection algorithms based deep learning methods / Wan Xing ... [et al.]
Published 2023“…Deep learning-based object detection algorithms can be categorized into three main types: end-to-end algorithms, two-stage algorithms, and one-stage algorithms. …”
Get full text
Get full text
Article -
19
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
Get full text
Get full text
Thesis -
20
Enhancing Wearable-Based Human Activity Recognition with Binary Nature-Inspired Optimization Algorithms for Feature Selection
Published 2026“…In the experiment, we conducted an evaluation of the effectiveness and efficiency of four nature-inspired binary algorithms for optimization namely Binary Particle Swarm Optimization (BPSO), Binary Grey Wolf Optimization algorithm (BGWO), Binary Differential Evolution algorithm (BDE), and Binary Salp Swarm algorithm (BSS) - in the context of human activity recognition (HAR). …”
Get full text
Get full text
Get full text
Get full text
Article
