Search Results - (( java _ implementation algorithm ) OR ( using practical evolutionary algorithm ))

Search alternatives:

Refine Results
  1. 1

    Evolutionary cost-cognizant regression test case prioritization for object-oriented programs by Bello, AbdulKarim

    Published 2019
    “…Afterward evolutionary algorithm (EA) was employed to prioritize test cases based on the rate severity of fault detection per unit test cost. …”
    Get full text
    Get full text
    Thesis
  2. 2

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…Today, with online marketing, banking, healthcare and other services, even the average householder is aware of encryption. The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  3. 3

    Evolutionary multi-objective optimization of autonomous mobile robots in neural-based cognition for behavioural robustness by Chin, Kim On, Teo, Jason Tze Wi, Azali Saudi

    Published 2009
    “…It explains the comparison performances among the elitism without archive and elitism with archive used in the evolutionary multi-objective optimization (EMO) algorithm in an evolutionary robotics study. …”
    Get full text
    Get full text
    Get full text
    Chapter In Book
  4. 4

    A comprehensive comparison of evolutionary optimization limited by number of evaluations against time constraints by Jia, Hui Ong, Teo, Jason Tze Wi

    Published 2016
    “…In this study, the importance of optimization problems constrained by time is highlighted. Practically allevolutionary optimization studies have focused exclusively on the use of number of fitness evaluations as the constraining factor when comparing different evolutionary algorithms (EAs). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Provider independent cryptographic tools by Ibrahim, Subariah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
    Get full text
    Get full text
    Get full text
    Monograph
  6. 6

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  7. 7

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Performance evaluation of real-time multiprocessor scheduling algorithms by Alhussian, H., Zakaria, N., Abdulkadir, S.J., Fageeri, S.O.

    Published 2016
    “…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Automatic Number Plate Recognition on android platform: With some Java code excerpts by ., Abdul Mutholib, Gunawan, Teddy Surya, Kartiwi, Mira

    Published 2016
    “…The main challenges of implementing ANPR algorithm on mobile phone are how to produce a higher coding efficiency, lower computational complexity, and higher scalability. …”
    Get full text
    Get full text
    Get full text
    Book
  11. 11

    Multi -Objective Economic Dispatch Using Evolutionary Programming by Noor Azlan Bin Adnan

    Published 2023
    “…This study focused on solving multi-objectives economic dispatch using Heuristic Optimization (HO) technique which is Multi-Objective Evolutionary Programming (MOEP). …”
  12. 12
  13. 13

    Enhanced multi-objective evolutionary mating algorithm with improved crowding distance and levy flight for optimizing comfort index and energy consumption in smart buildings by Muhammad Naim, Nordin, Mohd Herwan, Sulaiman, Nor Farizan, Zakaria, Zuriani, Mustaffa

    Published 2025
    “…These enhancements enable MOEMA to effectively navigate complex multi-objective landscapes, leading to more diverse and well-converged Pareto-optimal solutions. The algorithm's performance is thoroughly assessed using the chosen benchmark functions and validated through practical applications in smart building environments. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Automatic generation of neural game controller using single and bi-objective evolutionary optimization algorithms for RTS Game by Chang, Kee Tong

    Published 2015
    “…After determine the rates another single objectives algorithm is tested. Hence, the second sub-objective is 2) to evolve RTS controllers using DE and FFNN. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework by Asaad Aref, Ibrahim

    Published 2004
    “…Java Media Framework library and the RTP protocol for audio transmission were used as development tools.The developed system designed in this thesis together with experimental results proved that the system could be implemented successfully. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Artificial Neural Controller Synthesis in Autonomous Mobile Cognition by Kim On Chin, Jason Teo

    Published 2009
    “…The testing results also showed that the robot was robust to these different environments used during the testing phases. Hence, the results demonstrated that the utilization of the evolutionary multi-objective approach in evolutionary robotics can be practically used to generate controllers for phototaxis and RF-localization behaviors in autonomous mobile robots.…”
    Get full text
    Get full text
    Article
  17. 17

    Artificial Neural Controller Synthesis in Autonomous Mobile Cognition by Chin Kim On, Jason Teo

    Published 2009
    “…The testing results also showed that the robot was robust to these different environments used during the testing phases. Hence, the results demonstrated that the utilization of the evolutionary multi-objective approach in evolutionary robotics can be practically used to generate controllers for phototaxis and RF-localization behaviors in autonomous mobile robots…”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  19. 19

    A Toolkit for Simulation of Desktop Grid Environment by FOROUSHAN, PAYAM CHINI

    Published 2014
    “…A simulator for desktop grid environment has been developed using Java as the implementation language due to its wide popularity. …”
    Get full text
    Get full text
    Final Year Project
  20. 20

    An efficient anomaly intrusion detection method with feature selection and evolutionary neural network by Sarvari, Samira, Mohd Sani, Nor Fazlida, Mohd Hanapi, Zurina, Abdullah @ Selimun, Mohd Taufik

    Published 2020
    “…A proposed model has been practically used to the problem of intrusion detection as well as been validated using the NSL-KDD dataset. …”
    Get full text
    Get full text
    Get full text
    Article