Search Results - (( java application matching algorithm ) OR ( basic evolution optimization algorithm ))
Search alternatives:
- evolution optimization »
- application matching »
- java application »
- basic evolution »
-
1
Comparison between Lamarckian Evolution and Baldwin Evolution of neural network
Published 2006“…We presented hybrid genetic algorithm for optimizing weights as well as the topology of artificial neural networks, by introducing the concepts of Lamarckian and Baldwin evolution effects. …”
Get full text
Get full text
Get full text
Article -
2
-
3
Heat exchanger network optimization using differential evolution with stream splitting
Published 2014“…This article introduces a new strategy for HEN optimization using differential evolution algorithm. …”
Get full text
Get full text
Article -
4
Multiple Objective Optimization of Green Logistics Using Cuckoo Searching Algorithm
Published 2016“…Basically, Cuckoo searching algorithm imitates the natural evolution of a population with initial solutions. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Optimal selection of location, sizing and power factor for solar PV plants using differential evolution
Published 2023Conference Paper -
6
Finding minimum path by using Genetic Algorithm (GA)/ Siti Zuraifah Hashim
Published 2007“…It makes use of three basic operations in order to optimize this problem. …”
Get full text
Get full text
Thesis -
7
Quality of service and energy efficient aware (QEEA) scheduling algorithm for long term evolution (LTE) network / Nurulanis Mohd Yusoff
Published 2017“…The proposed algorithm is compared against other scheduling algorithms, namely, the Channel and QoS Aware (CQA), Priority Set Scheduler (PSS), Proportional Fair (PF), Maximum Throughput (MT) and Blind Average Throughput (BAT). …”
Get full text
Get full text
Thesis -
8
Gradient-based mutation manta ray foraging optimization (gbm-mrfo) for solving constrained real-world problems
Published 2022“…GbM-MRFO turn out to be a competitive optimization algorithm on solving constrained optimization problem of Three-bar Truss problem. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
-
10
-
11
Message based random variable length key encryption algorithm.
Published 2009Get full text
Get full text
Article -
12
Securing cloud data system (SCDS) for key exposure using AES algorithm
Published 2021“…The AES algorithm has its own structure to encrypt and decrypt sensitive data that make the attackers difficult to get the real data when encrypting by AES algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
13
-
14
An Agent-Based System with Personalization and Intelligent Assistance Services for Facilitating Knowledge Sharing
Published 2006“…The main algorithms used are profile determination and user similarity. …”
Get full text
Get full text
Thesis
