Search Results - (( java implementation some algorithm ) OR ( pattern evolution optimization algorithms ))
Search alternatives:
- optimization algorithms »
- evolution optimization »
- java implementation »
- implementation some »
- pattern evolution »
- some algorithm »
-
1
Optimal HE-PWM inverter switching patterns using differential evolution algorithm
Published 2012Get full text
Get full text
Get full text
Conference or Workshop Item -
2
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
3
-
4
Efficient radio resource management algorithms for downlink long term evolution networks
Published 2018“…The algorithm is based on the idea of the optimization problem in which resource allocation problem is formulated as an optimization problem. …”
Get full text
Get full text
Thesis -
5
A novel Master–Slave optimization algorithm for generating an optimal release policy in case of reservoir operation
Published 2019“…First, three different optimization algorithms, namely particle swarm optimization, differential evolution, and whale optimization algorithm, have been applied. …”
Get full text
Get full text
Article -
6
Route Optimization System
Published 2005“…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
Get full text
Get full text
Final Year Project -
7
A filtering algorithm for efficient retrieving of DNA sequence
Published 2009“…The biologists frequently demand for optimal comparison result so that the perfect structure of living beings evolution can be constructed. …”
Get full text
Get full text
Get full text
Article -
8
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…It is shown that the implementation of AES encryption algorithm is capable to secure data stored in HDFS to some extent.…”
Get full text
Get full text
Conference or Workshop Item -
9
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…It is shown that the implementation of AES encryption algorithm is capable to secure data stored in HDFS to some extent.…”
Get full text
Get full text
Conference or Workshop Item -
10
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
11
Multi-area economic dispatch by using differential evolution immunized ant colony optimization (DEIANT)
Published 2023“…Each region has a specific cost and load pattern. Tie-lines are used as connectors to enable power switching between regions. 31-Bus test system tested using an algorithm known as Differential Evolution Immunized Ant Colony Optimization (DEIANT) with different case studies with several trials taken to assess the consistency of results. …”
Article -
12
Design Of Feature Selection Methods For Hand Movement Classification Based On Electromyography Signals
Published 2020“…The third method is the hybridization of BPSO and Binary Differential Evolution, namely Binary Particle Swarm Optimization Differential Evolution (BPSODE). …”
Get full text
Get full text
Get full text
Thesis -
13
Fuzzy modeling using Bat Algorithm optimization for classification
Published 2018“…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
14
Reservoir system modelling using nondominated sorting genetic algorithm in the framework of climate change
Published 2014“…In conclusion, this finding contributes toward the development of models using evolution algorithm and statistical methods for sustainable water resources planning and management in the context of future climate change…”
Get full text
Get full text
Thesis -
15
Implementation of RIO in UMJaNetSim / Chan Chin We
Published 2004“…In this project, I will do some research on the recent TCP congestion control and avoidance mechanisms and implement one of the mechanisms into the Java Network Simulator (JaNetSim). …”
Get full text
Get full text
Thesis -
16
Genetic ensemble biased ARTMAP method of ECG-Based emotion classification
Published 2012“…The optimal combination of λ and training sequence can be computed efficiently using a genetic permutation algorithm. …”
Get full text
Get full text
Conference or Workshop Item -
17
Comparison of performances of Jaya Algorithm and Cuckoo Search algorithm using benchmark functions
Published 2022“…This paper aims to compare the performance of two metaheuristic algorithms which are Jaya Algorithm (JA) and Cuckoo Search (CS) using some common benchmark functions. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
Comparative study on the reservoir operation planning with the climate change adaptation
Published 2019“…The non-dominated sorting genetic algorithm version II (NSGA-II) was applied in both analyses to optimize the water use due to the multi-objectives demand, maximizing water release, minimizing water shortage and maximizing reservoir storage. …”
Get full text
Get full text
Get full text
Article -
19
Comparative study on the reservoir operation planning with the climate change adaptation
Published 2019“…The non-dominated sorting genetic algorithm version II (NSGA-II) was applied in both analyses to optimize the water use due to the multi-objectives demand, maximizing water release, minimizing water shortage and maximizing reservoir storage. …”
Get full text
Get full text
Get full text
Article -
20
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
Get full text
Get full text
Thesis
