Search Results - (( java implementation ant algorithm ) OR ( using string based algorithm ))

Refine Results
  1. 1

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…This study proposes a car parking management system which applies Dijkstra’s algorithm, Ant Colony Optimization (ACO) and Binary Search Tree (BST) in structuring a guidance system for indoor parking. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6

    Optimisation of corona ring design and its impact on the performance of insulator string in high voltage transmission lines / Kalaiselvi Aramugam by Kalaiselvi , Aramugam

    Published 2022
    “…However, installing a corona ring with an optimum design to reduce the electric field magnitude on an insulator string is a challenging task. Therefore, in this work, a method to achieve an optimum design of a corona ring for a 33 kV and 132 kV composite non-ceramic insulator string was proposed using optimisation methods; Gravitational Search Algorithm (GSA), Imperialist Competitive Algorithm (ICA) and Grey Wolf Optimisation (GWO). …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8
  9. 9

    A new text-based w-distance metric to find the perfect match between words by Ali, M., Jung, L.T., Hosam, O., Wagan, A.A., Shah, R.A., Khayyat, M.

    Published 2020
    “…The k-NN algorithm is an instance-based learning algorithm which is widely used in the data mining applications. …”
    Get full text
    Get full text
    Article
  10. 10

    Dynamic key scheduling algorithm for block ciphers using quasigroup string transformation by Hassan Disina, Abdulkadir

    Published 2018
    “…Based on the dynamic shapeless quasigroup and the proposed new string transformation, a Dynamic Key Scheduling Algorithm (DKSA) is developed. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    A Threshold-Based Combination of String and Semantic Similarity Measures for Record Linkage by Ektefa, Mohammadreza

    Published 2011
    “…As experimental results indicate, the combined similarity measure which is based on the combination of string and semantic similarity measures outperforms the string and semantic similarity measures, which are used individually, with the F-measure of 99.1% in Restaurant dataset, and 88.3% in Cora dataset. …”
    Get full text
    Thesis
  12. 12

    Design of digital circuit structure based on evolutionary algorithm method by Chong, Kok Hen, Aris, Ishak, Bashi, Senan Mahmood, Koh, Johnny Siaw Paw

    Published 2008
    “…Evolutionary Algorithms (EAs) cover all the applications involving the use of Evolutionary Computation in electronic system design. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13
  14. 14

    Threshold value of DC array current and DC string voltage for fault detection in grid-connected photovoltaic system / Nurmalessa Muhammad … [et al.] by Muhammad, Nurmalessa, Zakaria, Nor Zaini, Shaari, Sulaiman, Omar, Ahmad Maliki

    Published 2020
    “…One of the methods in detecting failure is by using the threshold-based method to compute the ratio of actual and predicted DC array current and DC string voltage value. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    VLSI floor planning optimization using genetic algorithm and cross entropy method / Angeline Teoh Szu Fern by Angeline Teoh, Szu Fern

    Published 2012
    “…GA is a widely used optimization algorithm based on the concept of survival of the fittest. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Evaluation of the effectiveness and efficiency of Wagner and Fischer algorithm in retrieving Hadith translated documents / Kamarul Arifin Muhamad by Muhamad, Kamarul Arifin

    Published 2002
    “…This thesis studies the method of a string-searching algorithm. The studies describe features and methods for string searching and comparison using Wagner and Fischer algorithm. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18
  19. 19
  20. 20

    A cylindrical coordinate system with dynamic permutation table for blowfish algorithm by Al-Abiachi, Ashwak M., Mahmod, Ramlan, Ahmad, Faudziah

    Published 2014
    “…The Blowfish Algorithm (BA) is a symmetric block cipher that iterates simple encryption and decryption functions by using Feistel networks.BA keys vary from 32-448 bits to ensure a high level of security.However, the BA requires a high memory percentage and it has a problem regarding randomness of output with text and image files having large strings of identical bytes.One solution to the seissues is to design a new Cryptography algorithm based on the BA that incorporates an F-function into a Cylindrical Coordinate System (CCS).The resulting F-function is known as a CCS with a Dynamic Permutation Table (DPT) or CCSDPT whereas the new algorithm is called the New BA (NBA).The objectives of the CCSDPT are to reduce memory requirements, enhance the randomness of the output and increase resistance to attacks through byte relocation and transformation in the right cylinder.NBA is evaluated by investigates the output of the algorithm by using statistical tests from the National Institute of Standard and Technology (NIST) with five types of data and compared with the BA.The findings of the NIST tests show that the NBA is suitable for any data stream, even those with long strings of identical bytes. …”
    Get full text
    Get full text
    Get full text
    Article