Search Results - (( solution implementation level algorithm ) OR ( java adaptation optimization algorithm ))

Refine Results
  1. 1
  2. 2

    Process Planning Optimization In Reconfigurable Manufacturing Systems by Musharavati, Farayi

    Published 2008
    “…On the other hand, the superior performance of the genetic algorithm that implements an extended diversity control mechanism demonstrates that more competent genetic algorithms can be designed through customized operators. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Three-phase three-level shunt active power filter with simplified synchronous reference frame by Hoon, Yap, Mohd Radzi, Mohd Amran, Hassan, Mohd Khair, Mailah, Nashiren Farzilah

    Published 2016
    “…Shunt active power filter (SAPF) is the most effective solution to current harmonics. In its controller, Synchronous Reference Frame (SRF) principle has widely been applied in current harmonics extraction algorithm due to its simple implementation features. …”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    A hybrid multi-objective optimisation for energy efficiency and better coverage in underwater wireless sensor networks / Salmah Fattah by Salmah , Fattah

    Published 2022
    “…The algorithm introduces the fuzzy Pareto dominance concept to compare two solutions and uses the scalar decomposition method when one solution cannot dominate the other in terms of the fuzzy dominance level. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    A hybrid multi-objective optimisation for energy efficiency and better coverage in underwater wireless sensor networks by Salmah Fattah

    Published 2022
    “…The algorithm introduces the fuzzy Pareto dominance concept to compare two solutions and uses the scalar decomposition method when one solution cannot dominate the other in terms of the fuzzy dominance level. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Implementation and Evaluation of Large Rsa Encryption and Decryption Keys For Internet Security by H. Belgassem, Seddeq

    Published 2004
    “…The deployment of network security procedures requires the implementation of Cryptographic algorithms. To facilitate this security issue, it is best to define a problem and advice a solution. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Enhancement of Ant System Algorithm for Course Timetabling Problem by Djamarus, Djasli

    Published 2009
    “…For this kind of problem, researchers believe that it will be better to find an approximate solution that can be delivered by a stochastic algorithm than waiting for an exact solution from the deterministic algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Low fatigue walking-in-place locomotion technique for mobile VR using smartphone’s inertia sensors by Ang, Yang Yi

    Published 2020
    “…The results show that the SV-SIP implementation can increase efficiency of side view task as compared to gaze-directed WIP implementation, and the fatigue level of SV-SIP is lower than the gaze-directed WIP implementation. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Selective harmonic elimination in multilevel inverter using hybrid APSO algorithm by Memon, Mudasir Ahmed, Mekhilef, Saad, Mubin, Marizan

    Published 2018
    “…The proposed algorithm is applicable to all levels of MLI having equal and non-equal DC sources. …”
    Get full text
    Get full text
    Article
  10. 10

    Hybrid ant colony system algorithm for static and dynamic job scheduling in grid computing by Alobaedy, Mustafa Muwafak Theab

    Published 2015
    “…These proposed hybrid algorithms will enhance ACS in terms of exploration mechanism and solution refinement by implementing low and high levels hybridization of ACS, GA, and TS algorithms. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    New Cryptographic Algorithms for Enhancing Security of Voice Data by Al-Hazaimeh, Obaida Mohammad Awad

    Published 2010
    “…The decryption process on the other hand is divided into two main stages: key extraction process, and decryption process. The proposed solution was implemented and tested and the results showed that the required time for the security processes is minimized compared to some known algorithms such as AES_Rijndael algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Optimization of Upstream Offshore Oilfield Production Planning under Uncertainty and Downstream Crude Oil Scheduling at Refinery Front-End by Tan Yin Keong, Tan Yin

    Published 2012
    “…This solution is the upper bound solution. The application of the proposed algorithm shows significant reduction in the computational effort involved in solving the problem. …”
    Get full text
    Get full text
    Final Year Project
  14. 14

    Optimization of Upstream Offshore Oilfield Production Planning under Uncertainty and Downstream Crude Oil Scheduling at Refinery Front-End by Tan , Yin Keong

    Published 2009
    “…This solution is the upper bound solution. The application of the proposed algorithm shows significant reduction in the computational effort involved in solving the problem. …”
    Get full text
    Get full text
    Final Year Project
  15. 15

    Optimization Algorithms: A Comparison Study for Scheduling Problem at UIN Raden Fatah's Sharia and Law Faculty by Mustakim, ., Tri Basuki, Kurniawan, Misinem, ., Edi Surya, Negara, Izman, Herdiansyah

    Published 2024
    “…Results indicate that while GA generally offers faster solutions, it requires more memory and shows variability in achieving optimal fitness levels. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Combined heat and power (CHP) economic dispatch solved using Lagrangian relaxation with surrogate subgradient multiplier updates by Sashirekha A., Pasupuleti J., Moin N.H., Tan C.S.

    Published 2023
    “…Flexibility for the choice of algorithm is given at the lower levels optimization techniques with the condition that the algorithm is able to improve its search at each iteration. …”
    Article
  17. 17

    Modified ant colony optimization algorithms for deterministic and stochastic inventory routing problems / Lily Wong by Lily , Wong

    Published 2018
    “…The computational results show that the algorithms which implement this new formulation are able to produce better solutions. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Proportional-integral control optimization using imperialist competitive algorithm by Soheilirad, Mohammadsoroush

    Published 2012
    “…A suitable tuning technique is needed for a wide range of control loops that can tune the PID controller with minimum cost, the highest of reliability and with optimum solution. In this dissertation, an attempt has been made to design and implement the PID Controllers by employing the Imperialist Competitive Algorithm (ICA) technique as well as the Genetic Algorithm (GA) and the Particle Swarm Optimization (PSO) algorithm, for a selected plant. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Dynamic Economic Dispatch For Power System by Hussein, Saif Tahseen

    Published 2016
    “…The solution algorithm based on a constraint relaxation and period-by-period is developed and tested. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    A cylindrical coordinate system with dynamic permutation table for blowfish algorithm by Al-Abiachi, Ashwak M., Mahmod, Ramlan, Ahmad, Faudziah

    Published 2014
    “…The combination of a DPT with a dynamic 3D S-box strengthens the resistance of the NBA against attacks and increases the randomness of the output.C++ is used in the implementation of both algorithms.The NIST tests are implemented under Linux.…”
    Get full text
    Get full text
    Get full text
    Article