Search Results - (( simulation evaluation based algorithm ) OR ( program implementation using algorithm ))
Search alternatives:
- program implementation »
- simulation evaluation »
- implementation using »
- evaluation based »
- using algorithm »
-
1
Vision-based robot indoor navigation
Published 2022“…This project aims to develop a vision-based navigation robot using OpenCV and C++ programming language in an indoor environment. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
2
Optimization Of Two-Dimensional Dual Beam Scanning System Using Genetic Algorithms
Published 2008“…This algorithm has been tested and implemented successfully via a dual beam optical scanning system.…”
Get full text
Get full text
Thesis -
3
Space allocation for examination scheduling using Genetic Algorithm / Alya Kauthar Azman
Published 2025“…The research adopts a Genetic Algorithm-based approach, where examination scheduling details such as date, time, course code, program code, student group, student numbers, and available spaces are encoded as chromosomes. …”
Get full text
Get full text
Thesis -
4
Virtual reality in algorithm programming course: practicality and implications for college students
Published 2024“…The reliability of VR supports various variations in learning, including learning programming algorithms. This research aims to design and develop VR in learning programming algorithms. …”
Get full text
Get full text
Get full text
Article -
5
An integrated reservoir modelling and evolutionary algorithm for optimizing field development in a mature fractured reservoir
Published 2016“…The second method is automatic optimization using Genetic Algorithm. That depends on the principle of natural selection as proposed by Darwin The genetic program was coupled with the reservoir flow model to re-evaluate the chosen wells at each iteration until obtaining the optimal choice. …”
Get full text
Get full text
Conference or Workshop Item -
6
-
7
Reconstruction algorithm of calibration map for RPT technique in quadrilateral bubble column reactor using MCNPX code
Published 2018“…The iterative reconstruction algorithms is used to generate and calculate the 2600 coordinates of calibration map from the number of photon counts from the ten NaI scintillation detectors. …”
Get full text
Get full text
Get full text
Article -
8
Deep Reinforcement Learning For Control
Published 2021“…The complete project is carried out in the CARLA simulator to determine how to operate in discrete action space using Deep Reinforcement Learning (DRL) algorithms. …”
Get full text
Get full text
Monograph -
9
Adaptive differential evolution algorithm with fitness based selection of parameters and mutation strategies / Rawaa Dawoud Hassan Al-Dabbagh
Published 2015“…ARDE algorithm makes use of JADE strategy and the MDE_pBX parameters adaptive schemes as frameworks. …”
Get full text
Get full text
Thesis -
10
A single measurement of combined Direct and indirect MPPT algorithm for mismatch PV module application / Mohd Najib Mohd Hussain
Published 2016“…The development of the system is carried out using Matlab/Simulink incorporated with MPLAB programming for evaluating and validating the system. …”
Get full text
Get full text
Thesis -
11
Application of Multi-objective Genetic Algorithm (MOGA) optimization in machining processes
Published 2020“…Some of these methods are managed in finding the optimum solution, but they have tendency to take longer time to converge so that need much computing time. Thus, by implementing MOGA approach that based on the natural biological evaluation principle will be used to tackle this kind of problem. …”
Get full text
Get full text
Get full text
Get full text
Book Chapter -
12
Computerized simulation system for ECM radar system
Published 2007“…Finally before code generation, the flow chart of the simulation algorithm was used. The system is based on C++ Builder application; it has the capability of OO programming with the enhancement of Visual Component Library (VCL). …”
Get full text
Get full text
Get full text
Thesis -
13
User authentication in public cloud computing through adoption of electronic personal synthesis behavior
Published 2023“…Secondly, a questionnaire prepared to examine the acceptance and use of EPSB. Finally, the implemented algorithm tested by comparing the accuracy of the current authentication framework with and without an EPSB algorithm. …”
text::Thesis -
14
SG-PBFS : Shortest Gap-Priority Based Fair Scheduling technique for job scheduling in cloud environment
Published 2024“…To conduct this experiment, we employed the CloudSim simulator, which is implemented using the Java programming language.…”
Get full text
Get full text
Get full text
Get full text
Article -
15
Dynamic investment model for the restructed power market in the presence of wind source
Published 2014“…In the third step, the long term optimal investment strategies of the hybrid wind-thermal investor are determined based on the dynamic programming algorithm by considering the long term states of demand growth and fuel price uncertainties. …”
Get full text
Get full text
Thesis -
16
Modeling Of Electrical Distribution Networks With Particle Swarm Optimization Technique For The Improvement Of Voltage Profile And Loss Reduction
Published 2016“…Determination of power flow was done using Open Distribution System Simulator (OpenDSS) program which is suitable for electrical distribution networks. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
17
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…A new multi-factor authentication scheme is designed using the AES-ECC algorithm based on Kerberos workflow to establish secure, efficient, and lightweight communication between the user and the targeted IIoT devices to avoid the issues. …”
Get full text
Get full text
Thesis -
18
Incorporating the range-based method into GridSim for modeling task and resource heterogeneity
Published 2017“…GridSim simulator has become a very popular simulation tool and has been widely used by Grid researchers to test and evaluate the performance of their proposed scheduling algorithms. …”
Get full text
Get full text
Get full text
Article -
19
Distance evaluated simulated kalman filter with state encoding for combinatorial optimization problems
Published 2018“…The algorithm proposed in this paper is called state-encoded distance evaluated SKF (SEDESKF) algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
20
Implementation of Autonomous Vehicle Navigation Algorithms Using Event-Driven Programming
Published 2012“…The algorithm can be relatively easy translated to a suitable program with event-driven programming technique. …”
Get full text
Get full text
Conference or Workshop Item
