Search Results - (( java implementation using algorithm ) OR ( based interactive swarm algorithm ))
Search alternatives:
- implementation using »
- java implementation »
- interactive swarm »
- using algorithm »
- swarm algorithm »
-
1
Adopting A Particle Swarm-Based Test Generator Strategy For Variable-Strength And T-Way Testing
Published 2011“…Unlike other existing AI-based strategies, the lightweight computation of the particle swarm search process enables PSTG to support high interaction strengths of up to t=6. …”
Get full text
Get full text
Thesis -
2
Verification of correctness properties for aggregation behavior of swarm robotics system using spin model checker / Siti Shafinaz Ali
Published 2015“…This algorithm is based on PFSA only relies on local interactions between individuals, the extensibility of the algorithm is very weak. …”
Get full text
Get full text
Thesis -
3
TBat: A Novel Strategy for Minimization of T-Way Interaction Test Suite Based on the Particle Swarm Optimization and the Bat Algorithm
Published 2016Get full text
Get full text
Conference or Workshop Item -
4
Verification correctness properties for aggregation behavior of swarm robotics system using SPIN model checker / Siti Shafinaz Ali
Published 2015“…This algorithm is based on PFSA only relies on local interactions between individuals, the extensibility of the algorithm is very weak. …”
Get full text
Get full text
Thesis -
5
A novel swarm-based optimisation algorithm inspired by artificial neural glial network for autonomous robots
Published 2019“…Artificial neuro-glial networks is proposed to be combined in the swarm-based communication algorithm to provide a human-like model for the robot's communication and optimization.…”
Get full text
Get full text
Monograph -
6
T-way strategy for sequence input interactions test case generation adopting fish swarm algorithm
Published 2019“…The reason is that the T-way sequence input interaction is NP-Hard problem. In this research, Fish Swarm algorithm is proposed to adapt with T-way sequence input interaction test strategy. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
8
Solving large-scale problems using multi-swarm particle swarm approach
Published 2018“…In this paper, a new balancing mechanism based on multi-swarm approach is proposed for balancing exploration and exploitation in metaheuristics. …”
Get full text
Get full text
Get full text
Article -
9
A microscopic swarm model simulation and fractal approach towards swarm agent behaviour
Published 2006“…The developed model also uses the physical based variables that can be measured. The collision avoidance algorithm is influenced by existing algorithm flock which uses the steering behaviour to animate birds. …”
Get full text
Get full text
Get full text
Article -
10
Novel Multi-swarm Approach for Balancing Exploration and Exploitation in Particle Swarm Optimization
Published 2019“…Most of these algorithms were inspired either by nature or the behavior of certain swarms, such as birds, ants, bees, or even bats. …”
Get full text
Get full text
Get full text
Book Chapter -
11
Simultaneous computation of model order and parameter estimation for ARX model based on single swarm and multi swarm simulated Kalman filter
Published 2017“…The performance of SMOPE and SMOPE-MS has been examined through the utilization of Particle Swarm Optimization (PSO) and Gravitational Search Algorithm (GSA). …”
Get full text
Get full text
Get full text
Article -
12
-
13
Fuzzy Adaptive Tuning of a Particle Swarm Optimization Algorithm for Variable-Strength Combinatorial Test Suite Generation
Published 2018“…Research has shown that stochastic population-based algorithms such as particle swarm optimization (PSO) can be efficient compared to alternatives for VS-CIT problems. …”
Get full text
Get full text
Get full text
Book Chapter -
14
Provider independent cryptographic tools
Published 2003“…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
Get full text
Get full text
Get full text
Monograph -
15
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
16
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
17
Optimization and discretization of dragonfly algorithm for solving continuous and discrete optimization problems
Published 2024“…Swarm intelligence algorithms are metaheuristic algorithms inspired by the simple interactions of biological organisms in a population. …”
Get full text
Get full text
Thesis -
18
On Adopting Parameter Free Optimization Algorithms for Combinatorial Interaction Testing
Published 2015“…Although useful, strategies based on the aforementioned optimization algorithms are not without limitation. …”
Get full text
Get full text
Get full text
Article -
19
Correlation with the fundamental PSO and PSO modifications to be hybrid swarm optimization
Published 2021“…Swarm-based metaheuristics, including nature-inspired populace-based methods, have been developed to aid the creation of quick, robust, and low-cost solutions for complex problems. …”
Get full text
Get full text
Get full text
Article -
20
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
Get full text
Get full text
Conference or Workshop Item
