Search Results - (( java validation using algorithm ) OR ( program normalization techniques algorithm ))

Refine Results
  1. 1

    Logic Programming In Radial Basis Function Neural Networks by Hamadneh, Nawaf

    Published 2013
    “…Two techniques were developed. The first technique is to encode the logic programming in radial basis function neural networks. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Solving non-convex economic dispatch problem using computational intelligence technique by Mansor M.H., Othman M.M., Musirin I., Saleh S.A.M.

    Published 2023
    “…Computer programming; Immune system; Scheduling; Artificial Immune System; Computational intelligence techniques; Economic Dispatch; Evolutionary programming algorithms; Log-normal; Non-convex economic dispatches; Reliability test system; Valve-point loading effect; Electric load dispatching…”
    Conference Paper
  3. 3

    Immune Log-Normal Evolutionary Programming (ILNEP) for solving economic dispatch problem with prohibited operating zones by Mansor M.H., Musirin I., Othman M.M.

    Published 2023
    “…Computer programming; Electric power system planning; Electric power systems; Evolutionary algorithms; Immune system; Problem solving; Scheduling; Artificial Immune System; Economic Dispatch; Economic dispatch problems; Electrical power system; Log-normal; Optimization techniques; Prohibited operating zone; Reliability test system; Electric load dispatching…”
    Conference Paper
  4. 4

    Priority and dynamic quantum time algorithms for central processing unit scheduling by Mohammed, Maysoon A.

    Published 2018
    “…Central Processing Unit is scheduled using different types of scheduling algorithms. One of the most widely algorithm used in scheduling with sharing and batch operating systems is Round Robin. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    Multi -Objective Economic Dispatch Using Evolutionary Programming by Noor Azlan Bin Adnan

    Published 2023
    “…This study focused on solving multi-objectives economic dispatch using Heuristic Optimization (HO) technique which is Multi-Objective Evolutionary Programming (MOEP). …”
  7. 7

    A Model for Evaluation of Cryptography Algorithm on UUM Portal by Norliana, Abdul Majid

    Published 2004
    “…The simulation model was developed using Active Server Page, JavaScript and SQL 7.0 as database. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Agent-based extraction algorithm for computational problem solving by Rajabi, Maryam

    Published 2015
    “…Various CPS techniques have been proposed such as PAC, IPO, Flowchart and Algorithm. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Design Optimization of 3-Phase Rectifier Power Transformers by Genetic Algorithm and Simulated Annealing by K.S., Rama Rao, Md Hasan, Khairul Nisak

    Published 2008
    “…Two non-linear programming techniques, GA and SA are applied for the estimation of transformer design parameters and the results are compared. …”
    Get full text
    Get full text
    Citation Index Journal
  10. 10
  11. 11

    Design Optimization of 3-phase rectifier power transformers by Genetic Algorithm and Simulated Annealing by K.S., Rama Rao, K.N., Mohd Hassan

    Published 2008
    “…Two non-linear programming techniques, GA and SA are applied for the estimation of transformer design parameters and the results are compared. …”
    Get full text
    Get full text
    Citation Index Journal
  12. 12
  13. 13
  14. 14

    Optimal Reactive Power Dispatch for Voltage Stability Improvement Considering Line Contingencies using PSO by Nor Rul Hasma, Abdullah, I., Musirin

    Published 2013
    “…The simulations results are compared with those obtained from the Evolutionary Programming (EP) technique in the attempt to highlight its merit. …”
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…In addition, the randomness of the session key generated from the MLCG is verified using NIST test suite. Besides that, the security of the proposed protocol is validated using the formal analysis tool, AVISPA. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Design Optimization of 3-phase rectifier power transformers by Genetic Algorithm and Simulated Annealing by K.S., Rama Rao, K.N., Mohd Hassan

    Published 2008
    “…Two non-linear programming techniques, GA and SA are applied for the estimation of transformer design parameters and the results are compared. …”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    A framework of test case prioritisation in regression testing using particle swarm-artificial bee colony algorithm by Ba-Quttayyan, Bakr Salim Abdullah

    Published 2024
    “…Ten knowledge and domain experts provided positive feedback on the framework's verification, affirming the framework's robustness. Validation was conducted through three experiments involving four Java programs. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…On the Construction phase, the development of the prototype has been started. All the algorithm for the engine has been developed by using Java script language. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Highest response ratio next (HRRN) vs first come first served (FCFS) scheduling algorithm in grid environment by Latip, Rohaya, Idris, Zulkhairi

    Published 2011
    “…A good scheduling algorithm normally shows lower value of total waiting and schedule time. …”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…The circuits have been designed by proteus, the microcontrollers have been programmed by micro C, and the Graphical User Interface (GUI) has been implemented in Java. Few by electronic components such as RFID, multiplexer, XBee, and servo motors have been used to realize the system. …”
    Get full text
    Get full text
    Thesis