Search Results - (( quality function bat algorithm ) OR ( java application new algorithm ))
Search alternatives:
- java application »
- application new »
- bat algorithm »
- new algorithm »
- function bat »
-
1
Enhanced convergence of Bat Algorithm based on dimensional and inertia weight factor
Published 2019“…Benchmark test function is then performed for the basic Bat Algorithm and the modified Bat Algorithm (MBA) for comparison. …”
Get full text
Get full text
Get full text
Article -
2
Enhancing benchmark optimization with evolutionary random approach: A comparative analysis of modified adaptive bats sonar algorithm (MABSA)
Published 2025“…This article presents a novel hybrid algorithm, combining the Modified Adaptive Bats Sonar Algorithm (MABSA) with the Squirrel Search Algorithm (SSA), and compares its performance with the original MABSA. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Enhanced Taguchi�s T-method using angle modulated Bat algorithm for prediction
Published 2023“…In response to this issue, this paper proposed an angle modulated Bat algorithm to be integrated with the T-method in optimizing the prediction model. …”
Article -
4
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
5
Application of genetic algorithm and JFugue in an evolutionary music generator
Published 2025“…This project explores the application of Genetic Algorithms (GA) with JFugue, which is a Java-based music programming library to develop an Evolutionary Music Generator. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
-
7
IWDSA: a hybrid Intelligent Water Drops with a Simulated Annealing for the localization improvement in wireless sensor networks
Published 2024“…Additionally, simulation results confirm that the proposed algorithm IWDSA exhibits outstanding performance compared to other algorithms utilizing optimization techniques, including genetic algorithms, bat algorithms, ant colony optimization, and swarm optimization. …”
Get full text
Get full text
Get full text
Article -
8
-
9
-
10
Text steganalysis using evolution algorithm approach
Published 2012Get full text
Get full text
Get full text
Conference or Workshop Item -
11
A decomposed streamflow non-gradientbased artificial intelligence forecasting algorithm with factoring in aleatoric and epistemic variables / Wei Yaxing
Published 2024“…The firefly algorithm remains a feasible alternative for shallow architectural network models, while metaheuristic algorithms such as the Particle swarm algorithm and Bat algorithm are better options for deeper architectural network models. …”
Get full text
Get full text
Get full text
Thesis -
12
Classification System for Heart Disease Using Bayesian Classifier
Published 2007“…This system was mainly developing using java programming. Apache Tom cat was used as a server in order to run the application smoothly. …”
Get full text
Get full text
Thesis -
13
-
14
Biometrics electronic purse
Published 1999“…This paper looked into using biometrics as a mean of authentication, thus requiring a new generation of Smart Card technology to be implemented in banking and multiple applications environment. …”
Get full text
Get full text
Get full text
Proceeding Paper -
15
Ant colony optimization algorithm for load balancing in grid computing
Published 2012Get full text
Get full text
Get full text
Monograph -
16
Security Analysis Between Static And Dynamic S-boxes In Block Ciphers
Published 2024Get full text
Article -
17
-
18
Evolutionary Music; Composing Beats and Chords Progression
Published 2020“…This project focuses on delivering a JAVA application named “Evoluthm” with mainly the functions of generating chords progressions and beats. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
19
-
20
Face recognition and identification system (FaceRec) / Khew Jye Huei
Published 2004“…Face recognition is a technique to identify an individual by his/her physical characteristic and has been of interest to a growing number of researchers due to its applications on security. Several different algorithms have been proposed for computer recognition of human faces. …”
Get full text
Get full text
Thesis
