Search Results - (( java adaptation optimization algorithm ) OR ( knowledge optimization method algorithm ))

Refine Results
  1. 1
  2. 2

    An improved method using fuzzy system based on hybrid boahs for phishing attack detection by Noor Syahirah, Nordin

    Published 2022
    “…Moreover, Butterfly Optimization Algorithm and Harmony Search Algorithm were combined as optimization method led to a new method named BOAHS. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Knowledge base processing method based on text classification algorithm by Baisheng Zhong, Mohd Shamrie Sainin, Tan Soo Fun

    Published 2023
    “…The text classification algorithm's knowledge base processing method utilizes existing data from the knowledge base to guide the construction and training of the classification model. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Optimizing Decentralized Exam Timetabling with a Discrete Whale Optimization Algorithm by Emily Siew, Sing Kiang, Sze, San Nah, Goh, Say Leng

    Published 2025
    “…In recent years, there has been increasing interest in intelligent optimization algorithms, such as the Whale Optimization Algorithm (WOA). …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6
  7. 7

    Optimizing decentralized exam timetabling with a discrete whale optimization algorithm by Emily Sing Kiang Siew, San nah sze, Say leng goh

    Published 2025
    “…—In recent years, there has been increasing interest in intelligent optimization algorithms, such as the Whale Optimization Algorithm (WOA). …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18

    Self organizing multi-objective optimization problem by Ismail, Fatimah Sham, Yusof, Rubiyah, Khalid, Marzuki

    Published 2011
    “…Weighted-sum approach genetic algorithm (GA) is one of the popular methods applied to solve multi-objectives optimization problems because it is a straight forward formulation and computationally efficient. …”
    Get full text
    Get full text
    Article
  19. 19

    Enhancement of lightweight block cipher algorithms by Taha Alshaikhli, Imad Fakhri, Al-Dabbagh, Sufyan Salim Mahmood, Zaba, Muhammad Reza

    Published 2017
    “…To the best of our knowledge, this is the first study that analyse the methods for generating key dependent S-box with lightweight block cipher algorithms.…”
    Get full text
    Get full text
    Book
  20. 20