Search Results - (( knowledge using modified algorithm ) OR ( java application customization algorithm ))
Search alternatives:
- customization algorithm »
- java application »
- knowledge using »
-
1
Enhancement on the modified artificial bee colony algorithm to optimize the vehicle routing problem with time windows
Published 2022“…The Artificial Bee Colony (ABC) is a popular swarm intelligence algorithm for COP. In this study, existing Modified ABC (MABC) algorithm is revised to solve the VRPTW. …”
Get full text
Get full text
Thesis -
2
-
3
-
4
-
5
Online DE optimization for Fuzzy-PID controller of semi-active suspension system featuring MR damper
Published 2022“…However, in the Fuzzy-PID controller, the fuzzy logic algorithm is used to auto-tune the PID controller, but it cannot be considered as a fully real-time controller since the fuzzy algorithm uses a previous knowledge base built offline. …”
Get full text
Get full text
Article -
6
A framework of modified adaptive neuro-fuzzy inference engine
Published 2012“…The Takagi-Sugeno-Kang (TSK) type fuzzy inference system was chosen and constructed by an automatic generation of clusters as well as membership functions and minimal rules through the use of hybrid fuzzy clustering and the modified apriori algorithms respectively. …”
Get full text
Get full text
Thesis -
7
Development of rule-based advisory system from modified hazard and operability study on fatty acid fractionation column
Published 2003“…Microsoft AccessTM and Visual BasicTM have been used to develop the knowledge-based and the inference engine respectively. …”
Get full text
Get full text
Conference or Workshop Item -
8
The effect of total bits and number of LFSRs on the hardware performance of modified A5/1 stream ciphers
Published 2024journal::journal article -
9
Development of a modified adaptive protection scheme using machine learning technique for fault classification in renewable energy penetrated transmission line
Published 2020“…This study proposed a modified standalone Machine Learning-based Adaptive Protection Scheme (ML-APS) relay' fault classifier model using novel useful hidden Knowledge Discovery from historical fault events Dataset (KDD) from healthy and faulty lines. …”
Get full text
Get full text
Thesis -
10
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
11
Disparity between theory & practice beyond the worst-case competitive analysis
Published 2019“…In an online problem, the algorithms is presented with a sequence on input in a serial fashion such that the algorithm does not have knowledge about the future inputs. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
12
The Security Level Of Two Xored-based A5 Crypto System
Published 2024“…Five (5) statistical tests were used to test the strength of the algorithm. Both of the proposed modified XORed-based A5/1 algorithms successfully passed the five (5) statistical tests.…”
Article -
13
-
14
DEVELOPMENT OF A MULTI-OBJECTIVE OPTIMZATION FRAMEWORK FOR INDUSTRIAL PROCESSES
Published 2014“…The knowledge obtained from the above explorations was then used to construct a novel framework for solving these problems efficiently. …”
Get full text
Get full text
Thesis -
15
Normative Fish Swarm Algorithm For Global Optimization With Applications
Published 2019“…Artificial Fish Swarm Algorithm (AFSA) have become popular optimization technique used to solve various problems, Nevertheless, according to surveys, the existing fish swarm algorithms still have some deficiencies to strike the exact optimum within appropriate convergence rate. …”
Get full text
Get full text
Thesis -
16
A framework of test case prioritisation in regression testing using particle swarm-artificial bee colony algorithm
Published 2024“…Regression test case prioritisation (TCP) is used to revalidate modified software, ensuring its quality before release on the digital market. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
17
Investigation On Optical Fibre Configurations For Process Tomography
Published 2002“…Linear back projection (LBP) algorithm is used to reconstruct the image. A modified reconstruction algorithm combining LBP and a priori knowledge is outlined. …”
Get full text
Get full text
Get full text
Article -
18
Multi-Objective Optimisation of CNC Milling Process for Al 6061 using Modified NSGA-II
Published 2016Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Security analysis of data transmission in an IoT based platform for telemedicine
Published 2021“…This study proposes a modified folded pipeline architecture for resource restriction applications with an AES algorithm. …”
Get full text
Get full text
Get full text
Article -
20
A novel association rule mining approach using TID intermediate itemset
Published 2018Get full text
Get full text
Article
