Search Results - (( programming ability application algorithm ) OR ( java adaptation optimization algorithm ))
Search alternatives:
- adaptation optimization »
- application algorithm »
- ability application »
- java adaptation »
-
1
Parallel distributed genetic algorithm development based on microcontrollers framework
Published 2023Conference paper -
2
Implementation of Autonomous Vehicle Navigation Algorithms Using Event-Driven Programming
Published 2012Get full text
Get full text
Conference or Workshop Item -
3
MAZE ROBOT: APPLYING AUTONOMOUS VEHICLE NAVIGATION ALGORITHM WITH EVENT-DRIVEN PROGRAMMING
Published 2011Get full text
Get full text
Final Year Project -
4
Implementation of autonomous vehicle navigation algorithms using event-driven programming
Published 2012Get full text
Get full text
Get full text
Conference or Workshop Item -
5
A method for group formation using genetic algorithm
Published 2010Get full text
Get full text
Get full text
Article -
6
Solving a Reconfigurable Maze using Hybrid Wall Follower Algorithm
Published 2013Get full text
Get full text
Citation Index Journal -
7
Group formation using genetic algorithm
Published 2009Get full text
Get full text
Get full text
Get full text
Monograph -
8
Novel techniques for voltage stability assessment and improvement in power system / Ismail Musirin.
Published 2004“…The results obtained from the voltage stability analysis using FVSI were utilized to predict system violation, identify most sensitive line corresponds to a load bus and estimate the maximum load ability and operating margin in the system. A new Evolutionary programming (EP) based acceleration search algorithm was developed to accelerate the process in estimating maximum load ability in a power system. …”
Get full text
Get full text
Thesis -
9
Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions
Published 2017“…The project has also implemented the optimization process onto the proposed ANFIS model through the hybrid of Genetic Algorithm on the fuzzy membership function of the ANFIS model. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
-
11
ProCAss: An intelligent assessment for computer programming corpus
Published 2005Get full text
Get full text
Get full text
Conference or Workshop Item -
12
-
13
Fuzzy logic controller for an automatic car gearbox shifting
Published 2009“…As a result, the GUI gives the correct gear selection based on the fuzzy logic algorithms that has been implemented in the programming part before. …”
Get full text
Get full text
Undergraduates Project Papers -
14
An interactive C++ programming courseware (SIFOO) / Mazliana Hasnan … [et al.]
Published 2012Get full text
Get full text
Book Section -
15
-
16
The child tracker using location awareness / Muhammad Idham Amdan
Published 2017Get full text
Get full text
Thesis -
17
-
18
A mixed integer linear programming model for real-time task scheduling in multiprocessor computer system
Published 2012“…There has been an upsurge in real-time multimedia applications in recent time.On a network, the ability of an average uni processor computer to handle such data may be limited due to the large size of such data.Also, there may be a high number of concurrent users who may want to retrieve data and the need to process them in real-time; and in continuous stream. …”
Get full text
Get full text
Get full text
Article -
19
Optimization of multipurpose reservoir operation using evolutionary algorithms / Mohammed Heydari
Published 2017“…Comparing the results of the combination of the PSO and GA algorithms makes clear that the obtained algorithm increased flexibility and improving the ability of the PSO algorithm to create the population with high-speed convergence and it is very applicable to solve the problems of operation optimization of water resources. …”
Get full text
Get full text
Get full text
Thesis -
20
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The experiment contains two phases; first phase was conducted against java applications that do not use any protection to determine the ability of reversing tools to read the compiled code. …”
Get full text
Get full text
Thesis
