Search Results - (( java selection search algorithm ) OR ( program implementation level algorithm ))

Refine Results
  1. 1

    Comparison of performances of Jaya Algorithm and Cuckoo Search algorithm using benchmark functions by Ahmed, Mashuk, Nasser, Abdullah B., Kamal Z., Zamli, Heripracoyo, Sulistyo

    Published 2022
    “…This paper aims to compare the performance of two metaheuristic algorithms which are Jaya Algorithm (JA) and Cuckoo Search (CS) using some common benchmark functions. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    An ensemble learning method for spam email detection system based on metaheuristic algorithms by Behjat, Amir Rajabi

    Published 2015
    “…In order to address the challenges that mentioned above in this study, in the first phase, a novel architecture based on ensemble feature selection techniques include Modified Binary Bat Algorithm (NBBA), Binary Quantum Particle Swarm Optimization (QBPSO) Algorithm and Binary Quantum Gravita tional Search Algorithm (QBGSA) is hybridized with the Multi-layer Perceptron (MLP) classifier in order to select relevant feature subsets and improve classification accuracy. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Web-based expert system for material selection of natural fiber- reinforced polymer composites by Ahmed Ali, Basheer Ahmed

    Published 2015
    “…Secondly, an expert system using Java programming technology with two tiers of search engine was developed to perform a fast selection of candidate materials in huge volume. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Message based random variable length key encryption algorithm. by Mirvaziri, Hamid, Jumari, Kasmiran, Ismail, Mahamod, Mohd Hanapi, Zurina

    Published 2009
    “…Long and variable key length made key exhaustive search and differential attack impossible. None fixed size key caused avoidance of replaying and other attacks that can happen on fixed sized key algorithms. …”
    Get full text
    Get full text
    Article
  6. 6

    Evolutionary Music; Composing Beats and Chords Progression by Ng, Hayden

    Published 2020
    “…For instance, the music’s speed, pitch range, number of layers, number of notes to be generated and different types of music instruments can be selected. Evoluthm utilizes Harmony Search Algorithm and JFUGUE techniques in compliances with artificial intelligence (AI). …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  7. 7

    An Educational Tool Aimed at Learning Metaheuristics by Kader, Md. Abdul, Jamaluddin, Jamal A., Kamal Z., Zamli

    Published 2020
    “…Initially, this tool adopts only Crow Search, Jaya, and Sine Cosine algorithms. But more metaheuristics will be included in future research. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Control algorithm for two-tank system using multiparametric programming by Zakaria, A., Mid, E.C., Mohamed, M.F., Hussin, M.H.M., Shaari, A.S., Ruslan, Eliyana, Hadi, Dayanasari, Masri, M.

    Published 2023
    “…In conclusion, the implementation of multiparametric programming is able to estimate the value of the output for the control algorithm of the two-tank system.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9
  10. 10
  11. 11
  12. 12

    Low-level hybridization scripting language with dynamic parameterization in PSO-GA / Suraya Masrom by Masrom, Suraya

    Published 2015
    “…However, in many cases, implementing the suitable hybrid algorithms for a given optimization problem is a considerably difficult, which in most cases, is time consuming. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Low-level hybridization scripting language with dynamic parameterization in PSO-GA / Suraya Masrom by Masrom, Suraya

    Published 2015
    “…However, in many cases, implementing the suitable hybrid algorithms for a given optimization problem is a considerably difficult, which in most cases, is time consuming. …”
    Get full text
    Get full text
    Book Section
  14. 14

    Parallel Implementation of Two Level Barotropic Models Applied to the Weather Prediction Problem by Bahri, Susila

    Published 2004
    “…To process the data collected from British Atmospheric Data Centre (BADC), the sequential programs in row and columnwise fashions are developed and implemented. …”
    Get full text
    Get full text
    Thesis
  15. 15

    A genetic algorithm for solving single level lotsizing problems by Zenon, Nasaruddin, Ahmad, Ab. Rahman, Ali, Rosmah

    Published 2003
    “…In this paper a genetic algorithm for solving single level lot-sizing problems is proposed and the results of applying the algorithm toexample problems are discussed. …”
    Get full text
    Get full text
    Article
  16. 16

    An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe by Yakub Kayode, Saheed, Kazeem Alagbe, Gbolagade

    Published 2017
    “…We use a parallel technique that divides RSA power process into seperate threads and employs the use of Chinese Remainder Theorem (CRT) to decrease the time required for both encryption and decryption operation. Java programming language is used to implement the algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Fuzzy expert system to evaluate programming question / Norfarhana Syamiza Amir Sham by Amir Sham, Norfarhana Syamiza

    Published 2017
    “…This system is used by lecturers that teach programming course. Data to implement the FES system is the type level of control structure in programming question paper that contributes to the level of the question. …”
    Get full text
    Get full text
    Thesis
  18. 18

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…The encryption algorithms are playing an important part in the protection level for data. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Professional and public accreditation as an assessment of agricultural educational program quality in Russia / Natalya A. Medvedeva, Nikolay G. Malkov and Marina L. Prozorova by A. Medvedeva, Natalya, G. Malkov, Nikolay, L. Prozorova, Marina

    Published 2021
    “…Professional and public accreditation of agricultural educational programs will allow for an external examination of the educational program implementation level and quality in accordance with approved professional standards and develop recommendations aimed at student training level improvement. …”
    Get full text
    Get full text
    Article
  20. 20