Search Results - (( java wave optimization algorithm ) OR ( based coding maximization algorithm ))

Refine Results
  1. 1

    Static code analysis of permission-based features for android malware classification using apriori algorithm with particle swarm optimization by Adebayo, Olawale Surajudeen, Abdul Aziz, Normaziah

    Published 2015
    “…In this method, permission-based features were extracted from Android applications byte-code through static code analysis, selected and were used to train supervised classifiers. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Genetic algorithm based network coding in wireless ad hoc networks by Tan, Shee Eng

    Published 2013
    “…Genetic algorithm based coding-aware routing (GACAR) is embedded in the wireless ad hoc network with network coding capabilities to search for coding opportunities for unicast sessions. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Block based low complexity iterative QR precoder structure for Massive MIMO by Mok, Li Suet

    Published 2021
    “…Meanwhile, we maximize the sum rate and also consider the restrictions on the computational complexity at the base station. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Reusability techniques in load-flow analysis computer program by Nor, K.M., Mokhlis, Hazlie, Gani, T.A.

    Published 2004
    “…These methodologies made the developed load-flow analysis software flexible for future enhancement. Adding and changing codes and algorithm of the software can be done without affecting much the existing codes and algorithms. …”
    Get full text
    Get full text
    Article
  5. 5

    Steganography algorithm to hide secret message inside an image by Ibrahim, Rosziati, Teoh, Suk Kuan

    Published 2011
    “…The proposed algorithm uses binary codes and pixels inside an image. …”
    Get full text
    Get full text
    Article
  6. 6

    Android Malware classification using static code analysis and Apriori algorithm improved with particle swarm optimization by Adebayo, Olawale Surajudeen, Abdul Aziz, Normaziah

    Published 2014
    “…Using a number of candidate detectors, the true positive rate of detecting malicious code is maximized, while the false positive rate of wrongful detection is minimized. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  7. 7

    Performances Of Metaheuristic Algorithms In Optimizing Tool Capacity Allocations by Goheannee

    Published 2014
    “…In this research, the algorithms studied includes Genetic Algorithm, Particle Swarm Optimization Algorithm, Differential Evolution Algorithm, Harmony Search Algorithm, Teaching-LearningBased Optimization Algorithm and Black Hole Algorithm. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Efficient mobile video transmission based on a joint coding scheme by Azni, Mohamed, Boudjadja, Rima, Dahmani, Abdelnasser, Zennir, Mohamed Nadjib

    Published 2017
    “…The purpose of this work is on one hand to minimize the Packet Loss Rate (PLR) and, on the other hand to maximize the visual quality of video transmitted over a wireless network (WN).The scheme proposed is founded on a FEC adaptable with the semantics of the H.264/AVC video encoding.This mechanism relies upon a rate distortion algorithm, controlling the channel code rates under the global rate constraints given by the WN.Based on a data partitioning (DP) tool, both packet type and packet length are taken into account by the proposed optimization mechanism which leads to unequal error protection (UEP). …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Development of an augmented reality based facility layout planning and optimization / Tan Chee Hau by Tan , Chee Hau

    Published 2020
    “…FLP’s research can be divided into the procedural approach, algorithmic approach, Virtual Reality (VR) and AR-based approaches. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    An optimum drill bit selection technique using artificial neural networks and genetic algorithms to increase the rate of penetration by Momeni, M., Hosseini, S.J., Ridha, S., Laruccia, M.B., Liu, X.

    Published 2018
    “…This paper discusses bit selection by employing a method of combining Artificial Neural Network (ANN) and the computation of Genetic Algorithm (GA). In this method, offset well drilling records are used for training the ANN model and International Association Drilling Contractors (IADC) bit codes are used to name each bit. …”
    Get full text
    Get full text
    Article
  11. 11

    Power improvement of solar photovoltaic (PV) based on maximum power point tracking (MPPT) controller / Siti Munirah Ahmad Saad by Siti Munirah, Ahmad Saad

    Published 2018
    “…This MPPT using perturb and observe algorithm, the algorithm are general algorithm and use as a code. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    A coded aperture-based 3D SPECT imaging system for early breast cancer detection by Hussain, Khalid

    Published 2023
    “…For the breast phantom, simulations were repeated for different lesion sizes and the tumor-to-background ratio (TBR). The proposed CA-based SPECT camera employs a mosaic MURA mask and antimask combined with the Maximum Likelihood Expectation Maximization (MLEM) algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Dynamic transmit antenna shuffling scheme for hybrid multiple-input multiple-output in layered architecture by Chong, Jin Hui

    Published 2010
    “…A new detection algorithm based on QR decomposition, denoted as LC-QR, is proposed. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16
  17. 17

    The Design of Pre-Processing Multidimensional Data Based on Component Analysis by Jasni, Mohamad Zain, Rahmat Widia, Sembiring

    Published 2011
    “…This paper aims to improve the quality of pre-processed data based on component analysis. RapidMiner is used for data pre-processing using FastICA algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Depth linear discrimination-oriented feature selection method based on adaptive sine cosine algorithm for software defect prediction by Nasser, Abdullah, H.M. Ghanem, Waheed Ali, H.Y. Saad, Abdul-Malik, Hamed Abdul-Qawy, Antar Shaddad, A. Ghaleb, Sanaa A, Mohammed Alduais, Nayef Abdulwahab, Din, Fakhrud, Ghetas, Mohamed

    Published 2024
    “…DASC-FS integrates the Adaptive Sine Cosine Algorithm (ASCA) as a search algorithm to determine the relevant features and adopts Depth Linear Discriminant Analysis (D-LDA) to identify the discriminative features that maximize class sepa ration. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Enhancing teaching and learning through data-driven optimization of servicing code demand and lecturer allocation using WEKA analysis by Rochin Demong, Nur Atiqah, Mohamed Razali, Murni Zarina, Kamaruddin, Juliana Noor, Shamsuddin, Sazwan, Awang, Nor Ain, Kamarudin, Norjuliatie, Wan Othman, Noor Faradilla

    Published 2025
    “…Attribute selection through Information Gain Attrite Evaluation model highlighted Program Code, Course Code and Type of Course as the strongest predictors of course approval and demand levels. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    An evaluation of Monte Carlo-based hyper-heuristic for interaction testing of industrial embedded software applications. by S. Ahmed, Bestoun, Enoiu, Eduard, Afzal, Wasif, Kamal Z., Zamli

    Published 2020
    “…Hyper-heuristic is a new methodology for the adaptive hybridization of meta-heuristic algorithms to derive a general algorithm for solving optimization problems. …”
    Get full text
    Get full text
    Get full text
    Article