Search Results - (( process generation search algorithm ) OR ( java application optimization algorithm ))

Refine Results
  1. 1

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Web-based expert system for material selection of natural fiber- reinforced polymer composites by Ahmed Ali, Basheer Ahmed

    Published 2015
    “…Secondly, an expert system using Java programming technology with two tiers of search engine was developed to perform a fast selection of candidate materials in huge volume. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Enhanced Harris's Hawk algorithm for continuous multi-objective optimization problems by Yasear, Shaymah Akram

    Published 2020
    “…This indicates the capability of the algorithm in exploring the search space. The 2S-ENDSHHMO algorithm can be used to improve the search process of other MOSI-based algorithms and can be applied to solve MOPs in applications such as structural design and signal processing.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Performance evaluation of real-time multiprocessor scheduling algorithms by Alhussian, H., Zakaria, N., Abdulkadir, S.J., Fageeri, S.O.

    Published 2016
    “…These results suggests that optimal algorithms may turn to be non-optimal when practically implemented, unlike USG which reveals far less scheduling overhead and hence could be practically implemented in real-world applications. …”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Development of heuristic methods based on genetic algorithm (GA) for solving vehicle routing problem by Ismail, Zuhaimy, Nurhadi, Irhamah, Zainuddin, Zaitul Marlizawati

    Published 2008
    “…However, simulated annealing generates only one mutated solution but Tabu Search generates many mutated solutions and moves to the solution with the lowest fitness of those generated. …”
    Get full text
    Get full text
    Monograph
  7. 7

    VISUALIZATION OF GENETIC ALGORITHM BASED ON 2-D GRAPH TO ACCELERATE THE SEARCHING WITH HUMAN INTERVENTIONS. by FAROOQ, HUMERA

    Published 2012
    “…Visualization techniques help in understanding the searching behaviour of Genetic Algorithm. lt also makes possible the user interactions during the searching process. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Route Optimization System by Zulkifli, Abdul Hayy

    Published 2005
    “…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
    Get full text
    Get full text
    Final Year Project
  9. 9

    A fuzzy adaptive teaching learning-based optimization strategy for generating mixed strength t-way test suites by Din, Fakhrud

    Published 2019
    “…Many test data generation strategies based on meta-heuristic algorithms such as Simulated Annealing (SA), Tabu Search (TS), Genetic Algorithm (GA), Ant Colony Optimization (ACO), Particle Swarm Optimization (PSO), Harmony Search (HS), Cuckoo Search (CS), Bat Algorithm (BA) and Bees Algorithm have been developed in recent years. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    A guided dynamic programming approach for DNA sequence similarity search by Mohd Nordin Abdul Rahman

    Published 2011
    “…Heuristics algorithms can process a fast DNA sequence alignment, but generate low comparison sensitivity.…”
    Get full text
    Thesis
  12. 12

    i-Saturate: The New Discovery of Stopping Criterion in Genetic Algorithm by Foo, Fong Yeng, Suhaimi, Azrina, Soo, Kum Yoke

    Published 2020
    “…In this study, a new stopping criterion called i-Saturate that measures saturation of population fitness of every generation chromosome (in GA searching process) is reported. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13
  14. 14
  15. 15

    A filtering algorithm for efficient retrieving of DNA sequence by Abdul Rahman, Mohd Nordin, Mohd. Saman, Md. Yazid, Ahmad, Aziz, Md. Tap, Abu Osman

    Published 2009
    “…Heuristics algorithms can process a fast DNA sequence alignment, but generate low comparison sensitivity. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    A hybrid adaptive harmony search with modified great deluge algorithm for school timetabling by Arbaoui, Billel

    Published 2025
    “…Harmony Search Algorithm (HSA) is one superior metaheuristic method to solve timetabling problem due to its search efficiency and less parameters settings. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Genetic Algorithm for Web Data Mining by Loo, Kevin Teow Aik

    Published 2001
    “…The use of various search engines could influence the number of search results in the World Wide Web. …”
    Get full text
    Get full text
    Project Paper Report
  18. 18

    Adopting A Particle Swarm-Based Test Generator Strategy For Variable-Strength And T-Way Testing by S. Ahmed, Bestoun

    Published 2011
    “…Many AI-based strategies have been developed, such as Ant Colony, Simulated Annealing, Genetic Algorithm, and Tabu Search. Although useful, most existing AI-based strategies adopt complex search processes and require heavy computations. …”
    Get full text
    Get full text
    Thesis
  19. 19

    An Adaptive Fuzzy Symbiotic Organisms Search Algorithm and Its Applications by Nurul Asyikin, Zainal, Azad, Saiful, Kamal Z., Zamli

    Published 2020
    “…This paper discusses the development of a Symbiotic Organisms Search Algorithm (SOS) variant, called Adaptive Fuzzy SOS (FSOS). …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Message based random variable length key encryption algorithm. by Mirvaziri, Hamid, Jumari, Kasmiran, Ismail, Mahamod, Mohd Hanapi, Zurina

    Published 2009
    “…Results: Attack on the key generation process was prevented because of random key generation and its dependency to input message. …”
    Get full text
    Get full text
    Article