Search Results - (( initial evolutionary process algorithm ) OR ( java implementation level algorithm ))

Refine Results
  1. 1
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…The encryption algorithms are playing an important part in the protection level for data. …”
    Get full text
    Get full text
    Thesis
  3. 3

    A Systematic Exploration of Mutation Space in a Hybridized Interactive Evolutionary Programming for Mobile Game Programming by Jia Hui Ong, Jason Teo

    Published 2014
    “…Evolutionary programming is the core Evolutionary Algorithm (EA) used in this study where it is hybridized with Interactive Evolutionary Algorithm (IEA) to generate different rulesets that was played on a custom arcade-type mobile game. …”
    Get full text
    Get full text
    Article
  4. 4

    Metric's thresholds for encoding evolutionary computing representation in software engineering problem by Md Sultan, Abu Bakar, Din, Jamilah, Zulzalil, Hazura, Bakar, Abubakar Diwani

    Published 2015
    “…For the problem to be implemented using this method, the initial process called representation should be established. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  6. 6
  7. 7

    An extended adaptive mechanism of evolutionary based channel assignment via reinforcement by Teo, Kenneth Tze Kin, Yew, Hoe Tung, Lye, Scott Carr Ken, Lim, Kit Guan, Ang, Soo Siang, Khairul Anuar Mohamad, Ali Chekima, Liau, Chung Fan, Aroland Jilui Kiring

    Published 2012
    “…Initial channel assignment parameters are obtained using self-learning scheme and evolutionary algorithms is used to fine-tune the estimated parameters from reinforcement learning algorithm to optimise the channel assignment problem in wireless mobile networks. …”
    Get full text
    Get full text
    Research Report
  8. 8

    Embedded Meta evolutionary-firefly algorithm-ANN for multi dg planning in distribution system / Siti Rafidah Abdul Rahim by Abdul Rahim, Siti Rafidah

    Published 2019
    “…In this study, Meta Evolutionary–Firefly Algorithm (EMEFA) was initially developed to expedite the computational time in multi-DG installation with improved accuracy. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter by Azhar, Nur Huwaina

    Published 2019
    “…It does not consider the LACE algorithm implemented in huge number of server in one Cloud datacenter. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Solving Unit Commitment Problem Using Multi-agent Evolutionary Programming Incorporating Priority List by Othman M.N.C., Rahman T.K.A., Mokhlis H., Aman M.M.

    Published 2023
    “…The search process is refined using heuristic EP-based algorithm with multi-agent approach to produce the final solution. …”
    Article
  11. 11

    Identifying movement of object in multiple images via particle swarm optimization algorithm / Mohd Haidhar Iqbal Hassan by Iqbal Hassan, Mohd Haidhar

    Published 2016
    “…In PSO algorithm, it solved the problem by using their own process such as particle initialization, evaluate fitness, convergence and other things. …”
    Get full text
    Get full text
    Student Project
  12. 12

    Optimization of RFID network planning for monitoring railway mechanical defects based on gradient-based Cuckoo search algorithm by Talib, Nihad Hasan

    Published 2020
    “…The solution strategy started in its initial input and process to find effective stations that can serve the railway monitoring system well. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Hybrid evolutionarybarnacles mating optimisation-artificial neural network based technique for solving economic power dispatch planning and operation / Nor Laili Ismail by Ismail, Nor Laili

    Published 2024
    “…In this study, a new optimisation algorithm termed Hybrid Evolutionary-Barnacles Mating Optimisation (HEBMO) was initially formulated to solve optimisation problems. …”
    Get full text
    Get full text
    Thesis
  14. 14

    A Model for Evaluation of Cryptography Algorithm on UUM Portal by Norliana, Abdul Majid

    Published 2004
    “…Level one is the development of userID and password, level two involve the insertion of the testing parameter speed coding. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…Performance Testing is used to test the performance of algorithm implementations in applications. The test results show that the Boyer Moore and Knuth Morris Pratt algorithms have an accuracy rate of 100%, and the Horspool algorithm 85.3%. …”
    Get full text
    Get full text
    Journal
  16. 16

    An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe by Yakub Kayode, Saheed, Kazeem Alagbe, Gbolagade

    Published 2017
    “…We use a parallel technique that divides RSA power process into seperate threads and employs the use of Chinese Remainder Theorem (CRT) to decrease the time required for both encryption and decryption operation. Java programming language is used to implement the algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    A hybrid ANN for output power prediction and online monitoring in grid-connected photovoltaic system / Puteri Nor Ashikin Megat Yunus by Megat Yunus, Puteri Nor Ashikin

    Published 2023
    “…After that, a hybrid of MLFNN with other optimization methods was introduced, i.e. Improved Fast Evolutionary Programming (IFEP), Evolutionary Programming- Dolphin Echolocation Algorithm (EPDEA) and Evolutionary Programming-Firefly Algorithm (EPFA). …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Unit commitment in power system using multi-agent evolutionary programming incorporating priority listing optimisation technique / Muhammad Nazree Che Othman by Che Othman, Muhammad Nazree

    Published 2013
    “…The search process then being refined using heuristic EP-based algorithm with multi-agent approach to produce the final solution. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Evolutionary-based feature construction with substitution for data summarization using DARA by Sia, Florence, Alfred, Rayner

    Published 2012
    “…This approach allows initial features to be used more than once in constructing newly constructed features. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item