Search Results - (( solution deviation selection algorithm ) OR ( java implementation level algorithm ))
Search alternatives:
- implementation level »
- deviation selection »
- selection algorithm »
- java implementation »
- level algorithm »
-
1
A Standard Deviation Selection in Evolutionary Algorithm for Grouper Fish Feed Formulation
Published 2016“…Results shown that the fitness of standard deviation selection in evolutionary algorithm is applicable. …”
Get full text
Get full text
Get full text
Article -
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…The encryption algorithms are playing an important part in the protection level for data. …”
Get full text
Get full text
Thesis -
3
A standard deviation selection in evolutionary algorithm for grouper fish feed formulation
Published 2016“…Malaysia is one of the major producer countries for fishery production due to its location in the equatorial environment.Grouper fish is one of the potential markets in contributing to the income of the country due to its desirable taste, high demand and high price.However, the demand of grouper fish is still insufficient from the wild catch.Therefore, there is a need to farm grouper fish to cater to the market demand.In order to farm grouper fish, there is a need to have prior knowledge of the proper nutrients needed because there is no exact data available.Therefore, in this study, primary data and secondary data are collected even though there is a limitation of related papers and 30 samples are investigated by using standard deviation selection in Evolutionary algorithm.Thus, this study would unlock frontiers for an extensive research in respect of grouper fish feed formulation.Results shown that the fitness of standard deviation selection in evolutionary algorithm is applicable.The feasible and low fitness, quick solution can be obtained. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
Get full text
Get full text
Undergraduates Project Papers -
5
Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter
Published 2019“…It does not consider the LACE algorithm implemented in huge number of server in one Cloud datacenter. …”
Get full text
Get full text
Thesis -
6
Enhancement of simultaneous network reconfiguration and DG sizing via Hamming dataset approach and firefly algorithm
Published 2019“…Explicit radiality verification is proposed based on Hamming dataset approach to significantly reduce the search space and the computational time, as well as to improve the quality of the solution. Subsequently, firefly algorithm is applied to attain near-optimal solution for NR and DG size. …”
Get full text
Get full text
Article -
7
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…Level one is the development of userID and password, level two involve the insertion of the testing parameter speed coding. …”
Get full text
Get full text
Get full text
Thesis -
8
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. The test results show that the Boyer Moore and Knuth Morris Pratt algorithms have an accuracy rate of 100%, and the Horspool algorithm 85.3%. …”
Get full text
Get full text
Journal -
9
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…We use a parallel technique that divides RSA power process into seperate threads and employs the use of Chinese Remainder Theorem (CRT) to decrease the time required for both encryption and decryption operation. Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
10
-
11
Efficient Time-Varying q-Parameter Design for q-Incremental Least Mean Square Algorithm with Noisy Links
Published 2022“…Furthermore, the closed-form solutions for the steady-state mean square deviation, excess mean square deviation and mean square error are derived. …”
Get full text
Get full text
Article -
12
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…Therefore, the AES encryption algorithm has been implemented in HDFS to ensure the security of data stored in HDFS. …”
Get full text
Get full text
Conference or Workshop Item -
13
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…Therefore, the AES encryption algorithm has been implemented in HDFS to ensure the security of data stored in HDFS. …”
Get full text
Get full text
Conference or Workshop Item -
14
An Evolutionary Algorithm: An Enhancement of Binary Tournament Selection for Fish Feed Formulation
Published 2022“…Therefore, this paper introduces binary-standard deviation (SD) tournament selection into EA as an enhancement of BT that can lead to focus on more exploration in terms of searching for the best solutions. …”
Get full text
Get full text
Get full text
Get full text
Article -
15
Variable Neighbourhood Search Algorithm for Vehicle Routing Problem with Backhaul
Published 2023“…A set of local search approaches and random shaking methods are proposed to conduct a list of neighbourhood solutions. Then, the most optimum solution among the neighbourhood solution in the improvement phase is selected as the final outcome of this research. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
16
-
17
Optimal placement and sizing of distributed generation in radial distribution networks using particle swarm optimization and forward backward sweep method
Published 2012“…PSO is among the meta-heuristics search methods like Genetic Algorithm (GA) but has been found to be computationally efficient, because it uses less number of functions for evaluation compared to GA that has genetic operators (Selection, crossover and mutation) and also the computational effort (time) required by PSO to arrive at high quality solutions is less than the effort required to the same high quality solutions by other heuristic search methods. …”
Get full text
Get full text
Thesis -
18
Optimal power flow solutions for power system operations using moth-flame optimization algorithm
Published 2020Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Optimal distribution system reconfiguration incorporating distributed generation based on simplified network approach / Mohammad Al Samman
Published 2020“…With the aim of reducing the computational time and improving the consistency in obtaining the optimal solution as well as minimizing power loss and voltage deviation of the EDN, this work proposes a new method based on a two-stage optimization. …”
Get full text
Get full text
Get full text
Thesis -
20
