Search Results - (( program implementation ant algorithm ) OR ( java data detection algorithm ))

Refine Results
  1. 1

    A study on solution of matrix riccati differential equations using ant colony programming and simulink / Mohd Zahurin Mohamed Kamali by Mohamed Kamali, Mohd Zahurin

    Published 2015
    “…In this thesis, we implement the modified ant colony programming (ACP) algorithm for solving the matrix Riccati differential equation (MRDE). …”
    Get full text
    Get full text
    Thesis
  2. 2

    Enhancement of Ant System Algorithm for Course Timetabling Problem by Djamarus, Djasli

    Published 2009
    “…This research starts with developing an algorithm based on original concept of Ant System Algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…The circuits have been designed by proteus, the microcontrollers have been programmed by micro C, and the Graphical User Interface (GUI) has been implemented in Java. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    Ant lion optimizer for solving unit commitment with solar photovoltaic integration / Izni Nadhirah Sam’on by Sam’on, Izni Nadhirah

    Published 2020
    “…The proposed ALO algorithm is able to identify the global optimum solution since the intensity of ants’ movement is adaptively decreased as the number of iterations increase. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Modified ant colony optimization algorithms for deterministic and stochastic inventory routing problems / Lily Wong by Lily , Wong

    Published 2018
    “…The computational results show that the algorithms which implement this new formulation are able to produce better solutions. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Optimal cost benefit of the EToU electricity tariff for a manufacturing operation by using optimization algorithm by Sulaima, Mohamad Fani, Alias, Nur Umirah, Wan Abdul Razak, Intan Azmira, Sardi, Junainah, Bohari, Zul Hasrizal

    Published 2021
    “…Thus, in this study, Simultaneous Demand Side Management (DSM) strategies are proposed for energy consumption cost reduction for a manufacturing energy load profile. Optimization algorithm namely Ant Colony Optimization (ACO) is implemented and cases with and without implementation of algorithm are compared in order to idealize the load profile of DSM strategy. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9
  10. 10

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
    Get full text
    Get full text
    Thesis
  11. 11

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…A GUI is created in a form of JAVA application to display data detected from tag. …”
    Get full text
    Get full text
    Thesis
  12. 12

    An ensemble learning method for spam email detection system based on metaheuristic algorithms by Behjat, Amir Rajabi

    Published 2015
    “…In the second phase, a classifier ensemble learning model is proposed consisting of separate outputs: (i) To select a relevant subset of original features based on Binary Quantum Gravitational Search Algorithm (QBGSA), (ii) To mine data streams using various data chunks and overcome a failure of single classifiers based on SVM, MLP and K-NN algorithms. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Image clustering comparison of two color segmentation techniques by Subramaniam, Kavitha Pichaiyan

    Published 2010
    “…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    ETOU electricity tariff for manufacturing load shifting strategy using ACO algorithm by Sulaima, Mohamad Fani, Dahlan, Nofri Yenita, Md Isa, Mohamed Hafiz, Othman, Md Nazri, Mat Yasin, Zuhaila, Kasdirin, Hyreil Anuar

    Published 2019
    “…Superior bio-inspired algorithm, Ant Colony Optimization (ACO) had been implemented to optimize the upright load profile of load shifting strategy in the Malaysia Enhance Time of Use (ETOU) tariff condition. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Adaptive Embedded Clonal Evolutionary Programming (AECEP) for optimal Distributed Generation (DG) location and sizing in a distribution system by Nur Zahirah, Mohd Ali

    Published 2013
    “…AI methods mainly include Artificial Neural Network (ANN), Expert System (ES), Genetic Algorithm (GA), Evolutionary Programming (EP), Ant Colony Optimization (ACO) and Particle Swarm Optimization (PSO). …”
    Get full text
    Get full text
    Thesis
  18. 18

    The implications for ahybrid detection technique against malicious sqlattacks on web applications by Bahjat Arif, Sarajaldeen Akram, Wani, Sharyar

    Published 2025
    “…The methodology is based on JavaScript and PHP languages for developing a new technique called DetectCombined capable of filtering queries using parameterized queries to protect against SQL injection which is a safe method. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography by Naji, Ahmed Wathik, Zaidan, B.B., Hameed, Shihab A., O-Khalifa, Othman

    Published 2009
    “…In addition, there are no formal methods to be followed to discover the hidden data. For this reason, the task of this paper becomes difficult. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Effective electricity cost management in a manufacturing operation by using optimal ETOU tariff formulation / M. F. Sulaima, N. Y. Dahlan and Z. M. Yasin by Sulaima, M. F., Dahlan, N. Y., Yasin, Z. M.

    Published 2019
    “…A superior bio-inspired algorithm, Particle Swarm Optimization (PSO) and Ant Colony Optimization (ACO) had been implemented and compared in order to optimize the upright load profile of load management strategy. …”
    Get full text
    Get full text
    Get full text
    Article