Search Results - (( filing implementation a algorithm ) OR ( evolution optimization path algorithm ))

Refine Results
  1. 1

    The Development Of A Robust Algorithm For Uav Path Planning In 3d Environment by Kok, Kai Yit

    Published 2016
    “…Significant research has been conducted on Unmanned Aerial Vehicle (UAV) path planning using evolutionary algorithms, such as Particle Swarm Optimization (PSO), Genetic Algorithm (GA), Differential Evolution (DE), and Biogeographic-Based Optimization (BBO). …”
    Get full text
    Get full text
    Thesis
  2. 2

    Development of an improved GWO algorithm for solving optimal paths in complex vertical farms with multi-robot multi-tasking by Shen, Jiazheng, Hong, Tang Sai, Fan, Luxin, Zhao, Ruixin, Mohd Ariffin, Mohd Khairol Anuar, As’arry, Azizan

    Published 2024
    “…The EPDE-GWO algorithm is compared with Genetic Algorithm (GA), Simulated Annealing (SA), Dung Beetle Optimizer (DBO), and Particle Swarm Optimization (PSO). …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3
  4. 4

    Finding minimum path by using Genetic Algorithm (GA)/ Siti Zuraifah Hashim by Hashim, Siti Zuraifah

    Published 2007
    “…Roadways and telephone systems are the examples of them. Genetic Algorithms (GA), pioneered by John Holland, applies the principle of evolution found in nature to the problem of finding an optimal solution. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Differential evolution optimization for constrained routing in Wireless Mesh Networks by Sanni, Mistura Laide, Hassan Abdalla Hashim, Aisha, Hassan, Wan Haslina, Ahmed, Gharib Subhi Mahmoud, Anwar, Farhat, Zakaria, Omar

    Published 2014
    “…This solution addresses efficient and optimal routing path construction for cost and quality metrics of the application. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  6. 6

    Literature Review of Optimization Techniques for Chatter Suppression In Machining by A. R., Yusoff, Mohamed Reza Zalani, Mohamed Suffian, Mohd Yusof, Taib

    Published 2011
    “…Various algorithms can be applied in the optimization of machining problems; however, Differential Evolution is the most appropriate for use in chatter suppression, being less time consuming, locally optimal, and more robust than both Genetic Algorithms, despite their wide applications, and Sequential Quadratic Programming, which is a famous conventional algorithm.…”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Automatic generation of user-defined test algorithm description file for memory BIST implementation by Hussin, Razaidi, Jidin, Aiman Zakwan, Loh, Wan Ying, Mispan, Mohd Syafiq, Lee, Weng Fook

    Published 2022
    “…It can be used by implementing a standard testing algorithm available in the EDA tool library or a user-defined algorithm (UDA). …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Comparative analysis of spiral dynamic algorithm and artificial bee colony optimization for position control of flexible link manipulators by Nor Maniha, Abdul Ghani, Nizaruddin, M. Nasir, Azrul Azim, Abdullah Hashim

    Published 2024
    “…By integrating the ABC algorithm into the manipulator's control system, the goal is to enhance its ability to plan paths and optimize trajectories. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…This research hopes to give a clear idea to the readers about ABS algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  10. 10

    Implementation and Evaluation of Large Rsa Encryption and Decryption Keys For Internet Security by H. Belgassem, Seddeq

    Published 2004
    “…In this research the most popular and used algorithm, which is RSA, is implemented with a new modification in order to reduce the calculation time of the algorithm. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Improving image denoising methods for PDF image files by Jeevarekha, Gunasegran

    “…Two algorithms are implemented and tested and a new algorithm is proposed for this purpose. …”
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  12. 12

    Effect of file sizes on encryption and decryption in constrained devices / Nurnadia Sapri by Sapri, Nurnadia

    Published 2015
    “…Therefore, AES-128 gives higher confidentiality compared to RSA-2048 and it will be most suitable encryption algorithm to be implemented in the TCP protocol.…”
    Get full text
    Get full text
    Thesis
  13. 13

    E-Raser: file shredder application with content replacement by using random words function by Mohd Nahar, Nur Farah Aqilah, Ab Rahman, Nurul Hidayah, Mohammad, Kamarudin Malik

    Published 2018
    “…Data shredding indicates a process of irreversible file destruction while file shredder is the program designed to render computer-based files unreadable by implementing overwriting method to destroy data in the content of a file. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Audio steganography using least significant bit and AES cryptographic algorithm / Nurul Hidayah Ahmad Zukri ... [et al.] by Ahmad Zukri, Nurul Hidayah, Kamarudin, Nur Khairani, Izraf Ishak, Mohd Enif, Md Rashid, Nor Aimuni

    Published 2018
    “…However, it is not enough to keep the contents of a message secret. Thus, another algorithm should be implemented to keep the existence of a message secret. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Hybrid genetic algorithm with multi-parents recombination for job shop scheduling problems / Ong Chung Sin by Ong, Chung Sin

    Published 2013
    “…This mechanism is restricted to search the possible solutions in a critical path. Modification on the path by using neighborhood search significantly reduces the total length of the makespan. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Modeling and multi-objective optimal sizing of standalone photovoltaic system based on evolutionary algorithms by Ridha, Hussein Mohammed

    Published 2020
    “…The IEM algorithm uses the attraction-repulsion mechanism to change the positions of solutions towards the optimality. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Keyword indexing for text documents using signature files / Abdul Hakim A. Gafa by A. Gafa, Abdul Hakim

    Published 2008
    “…The main of this project is to compare the effectiveness of searching Text documents between using Signature files algorithm and Inverted files algorithm. In order to achieve the main objective, the Signature Files algorithm for indexing methods needs to be understood and implemented. …”
    Get full text
    Get full text
    Thesis
  18. 18

    EMAPlus-optimized adaptive convergence prescribed performance control for high-precision steering of rack steering vehicles by Addie Irawan, Hashim, Norsharimie, Mat Adam, Mohd Iskandar Putra, Azahar, Mohd Zamri, Ibrahim, Mohd Herwan, Sulaiman

    Published 2026
    “…EMAPlus is employed to jointly tune the ACPPC and AW-PI parameters, enabling fast, stable, and computationally efficient optimization compared with the original Evolutionary Mating Algorithm (EMA), Ant Lion Optimizer (ALO), and Grasshopper Optimization Algorithm (GOA). …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Concealment of files blocked by Gmail with EOF-based image steganography by Taufik, Ichsan, Syaripudin, Undang, Kaffah, Faiz M., Ismail, Nanang, Sobirin, Jaka Giri, Gunawan, Teddy Surya

    Published 2018
    “…Before a special extension file is inserted into the cover file, a compression process should be conducted first to make the file size smaller. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    The Implementation of Securing Plaintext File Using Cryptography Method in Web Based Environment by Hasnira, Md. Lazim

    Published 2004
    “…The objective of this research in primarily to find the best fit crytography system that can encrypt and decrypt the extension file .doc, implement it in a simple application which works similar to email and construct and run a set of evaluation to securing plaintext file in a web based environment. …”
    Get full text
    Get full text
    Get full text
    Thesis