Search Results - (( java application during algorithm ) OR ( using evolution force algorithm ))

Refine Results
  1. 1

    Comparison between Lamarckian Evolution and Baldwin Evolution of neural network by Taha, Imad, Inazy, Qabas

    Published 2006
    “…There are two basic strategies in using hybrid GAs, Lamarckian and Baldwinian evolution. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    SUDOKU HELPER by Abdul Razak, Muhammad Asyraf

    Published 2015
    “…In this paper research, author presents an algorithm to provide a tutorial for any Sudoku player who got stuck during the solving process. …”
    Get full text
    Get full text
    Final Year Project
  3. 3

    Enhancing clustering algorithm with initial centroids in tool wear region recognition by Kasim, Nur Adilla, Nuawi, Mohd Zaki, Abdul Ghani, Jaharah, Ngatiman, Nor Azazi, Che Haron, Che Hassan, Muhammad Rizal

    Published 2020
    “…It is embedded with a new tactic to recapture the K value and new initial seedings computation to kick off the system until it converges. Force components of cutting force Fc, thrust force Ft and perpendicular cutting force Fcn were extracted from Neo-MoMac cutting force measurement device. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  4. 4
  5. 5

    POISSON EQUATION FOR ELECTROSTATIC FIELD USING THE FINITE DIFFERENCE METHOD by IFFAH FATHANAH, AHMAD RAZALI

    Published 2019
    “…The Dirichlet boundary will be use because it is nothing more than a forced solution to the potential function at specific points. …”
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  6. 6
  7. 7

    Development of a robust intelligent controller for a semi-active car suspension system by Abas, Hesham Ahmed Abdul Mutleba

    Published 2022
    “…In this research, Differential Evolution (DE) algorithm is modified to enhance the Fuzzy logic output gains to increase the performance of PID portion of the Fuzzy-PID controller. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Gripping controller design for a one-degree-of-freedom robotic hand model based on slip detection by Al-Shanoon, Abdulrahman Abdulkareem Sattoori

    Published 2016
    “…Measuring the grasping force between the robotic hand and an object can be achieved by using Force-Sensing Resistor (FSR), which have been widely used in robotics applications. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  10. 10

    Modeling and multi-objective optimal sizing of standalone photovoltaic system based on evolutionary algorithms by Ridha, Hussein Mohammed

    Published 2020
    “…The IEM algorithm uses the attraction-repulsion mechanism to change the positions of solutions towards the optimality. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Vibration-based structural damage detection and system identification using wavelet multiresolution analysis / Seyed Alireza Ravanfar by Seyed Alireza, Ravanfar

    Published 2017
    “…Then, the damage severities at the identified locations are assessed using genetic algorithm (GA), through defining a database to reveal the relationships between the energies obtained and damage severities. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications by Hydara, Isatou

    Published 2015
    “…This research work was limited to Java based web applications. In future research, the method can be extended to include other programming languages as well as other similar web application security vulnerabilities.…”
    Get full text
    Get full text
    Thesis
  16. 16

    Dynamic transmit antenna shuffling scheme for hybrid multiple-input multiple-output in layered architecture by Chong, Jin Hui

    Published 2010
    “…The computational complexity (total number of arithmetic operations) of proposed LC-QR algorithm is significantly lower than the conventional QR decomposition, zero-forcing (ZF) and minimum mean square error (MMSE) detection algorithm. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Human activity recognition via accelerometer and gyro sensors by Tee, Jia Lin

    Published 2023
    “…To implement the data engineering system proposed, two mobile applications, SensorData and SensorDataLogger with user-friendly interfaces and intuitive functionalities are developed using Java programming language and Android Studio. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  18. 18

    A conceptual Malaysian private healthcare university-of-the-future business model: staying relevant in the digital and post-covid era by Saiid, Muhammad, Bah, Ahmadou Pathe, Ahmad Dahlan, Abdul Rahman

    Published 2022
    “…In today's increasingly interconnected and globalized world, global mega forces including geopolitical, economic, technological and environmental have caused the landscape of higher education to become volatile. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19
  20. 20

    Fully decentralized, cost-effective energy demand response management system with a smart contracts-based optimal power flow solution for smart grids by Merrad, Yacine, Habaebi, Mohamed Hadi, Toha, Siti Fauziah, Islam, Md Rafiqul, Gunawan, Teddy Surya, Mesri, Mokhtaria

    Published 2022
    “…In this paper, we propose a novel, fully decentralized architecture for an OPF-based demand response management system that uses smart contracts to force generators to comply without the need for a central authority or hardware.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article