Search Results - (( java implementation models algorithm ) OR ( using ant learning algorithm ))
Search alternatives:
- implementation models »
- java implementation »
- learning algorithm »
- models algorithm »
- ant learning »
- using ant »
-
1
A Hybrid of Ant Colony Optimization Algorithm and Simulated Annealing for Classification Rules
Published 2013“…In the first proposed algorithm, SA is used to optimize the rule's discovery activity by an ant. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
Training functional link neural network with ant lion optimizer
Published 2020“…This paper proposed the implementation of Ant Lion Algorithm as learning algorithm to train the FLNN for classification tasks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
4
Predicting breast cancer using ant colony optimisation / Siti Sarah Aqilah Che Ani
Published 2021“…This study implements a machine learning algorithm called Ant Colony Optimization (ACO) algorithm to develop an accurate classification model for predicting breast cancer cells. …”
Get full text
Get full text
Student Project -
5
A conceptual multi-agent framework using ant colony optimization and fuzzy algorithms for learning style detection
Published 2023“…The multi-agent system applies ant colony optimization and fuzzy logic search algorithms as tools to detecting learning styles. …”
Conference Paper -
6
Hybrid ant colony optimization and genetic algorithm for rule induction
Published 2020“…In this study, a hybrid rule-based classifier namely, ant colony optimization/genetic algorithm ACO/GA is introduced to improve the classification accuracy of Ant-Miner classifier by using GA. …”
Get full text
Get full text
Get full text
Article -
7
Binary ant colony optimization algorithm in learning random satisfiability logic for discrete hopfield neural network
Published 2024“…This study introduced a novel ant colony optimization algorithm that implements the population selection strategy of the Estimation of Distribution Algorithm and a new pheromone updating formula. …”
Get full text
Get full text
Get full text
Article -
8
Solving robot path planning problem using Ant Colony Optimisation (ACO) approach / Nordin Abu Bakar and Rosnawati Abdul Kudus
Published 2009“…Learning is a complex cognitive process; thus, the algorithms that can simulate learning are also complex. …”
Get full text
Get full text
Get full text
Article -
9
Hybrid Ant Colony Optimization For Two Satisfiability Programming In Hopfield Neural Network
Published 2019“…The newly proposed metaheuristic algorithm was enhanced ant colony optimization (ACO) algorithm.…”
Get full text
Get full text
Thesis -
10
Provider independent cryptographic tools
Published 2003“…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
Get full text
Get full text
Get full text
Monograph -
11
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
12
Adaptive route optimization for mobile robot navigation using evolutionary algorithm
Published 2021“…Classical methods like artificial potential field, grid search, and visual method have been easily overtaken by artificial intelligence due to its adaptability and ability to learn from the past mistakes or experience. For example, Ant Colony Optimization (ACO) is an optimization algorithm based on swarm intelligence which is widely used to solve path planning problem. …”
Get full text
Get full text
Get full text
Get full text
Proceedings -
13
Reactive approach for automating exploration and exploitation in ant colony optimization
Published 2016“…Ant colony optimization (ACO) algorithms can be used to solve nondeterministic polynomial hard problems. …”
Get full text
Get full text
Get full text
Thesis -
14
ACOustic: A nature-inspired exploration indicator for ant colony optimization
Published 2015“…A statistical machine learning indicator, ACOustic, is proposed to evaluate the exploration behavior in the iterations of ant colony optimization algorithms. …”
Get full text
Get full text
Get full text
Article -
15
Successor selection for Ant Colony Optimization technique algorithm / Muhammad Iskandar Isman
Published 2017“…Therefore, in this research, will be use Ant Colony Optimization (ACO) algorithm as an optimize technique that provide a shortest path of defining a successor that is their highest value of criteria. …”
Get full text
Get full text
Thesis -
16
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013“…The performance of Java programming model and native programming model are compared with respect to the execution time for blood vessel detection. …”
Get full text
Get full text
Conference or Workshop Item -
17
A Toolkit for Simulation of Desktop Grid Environment
Published 2014“…A simulator for desktop grid environment has been developed using Java as the implementation language due to its wide popularity. …”
Get full text
Get full text
Final Year Project -
18
-
19
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…The methodology used in this study begun with problem identification, requirement identification, analysed the model process and design the simulation model. The simulation model was developed using Active Server Page, JavaScript and SQL 7.0 as database. …”
Get full text
Get full text
Get full text
Thesis -
20
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item
