Search Results - (( storage optimization modified algorithm ) OR ( java application during algorithm ))

Refine Results
  1. 1

    New Quasi-Newton Equation And Method Via Higher Order Tensor Models by Gholilou, Fahimeh Biglari

    Published 2010
    “…The efficiency of the usual QN methods is improved by accelerating the performance of the algorithms without causing more storage demand. The presented equation allows the modification of several algorithms involving QN equations for practical optimization that possess superior convergence prop- erty. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Modelling of optimal placement and sizing of battery energy storage system using hybrid whale optimization algorithm and artificial immune system for total system losses reduct... by Wong Ling Ai

    Published 2023
    “…Besides, an optimization algorithm with high efficiency is important to ensure the attainment of optimal solutions, where the optimization algorithms like genetic algorithm and particle swarm optimization are known to have high possibility of being trapped in local optimal points. …”
    text::Thesis
  3. 3
  4. 4

    Solving the integrated inventory supply chain problems using meta-heuristic methods / Seyed Mohsen Mousavi by Seyed Mohsen , Mousavi

    Published 2018
    “…A Modified Particle Swarm Optimization (MPSO) algorithm, a Genetic Algorithm (GA), a modified fruit fly optimization algorithm (MFOA) and a simulated annealing (SA) algorithm were used to find the optimal solution. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    The Bacterial Foraging Optimisation Algorithm using Prototype Selection and Prototype Generation for Data Classification by Faizol, Bin Mohd Suria

    Published 2020
    “…Technically, BFOA has been applied as supplementary algorithm for optimizing weight, parameters for other classifier algorithms and selecting optimised features for other classifiers. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    A modified weighted support vector machine (WSVM) to reduce noise data in classification problem by Mohd Dzulkifli, Syarizul Amri

    Published 2021
    “…When noise exists in training data, the decision boundary of SVM would deviate from the optimal hyperplane severely. To overcome SVM drawback for noise data problem, WSVM using KPCM algorithm was used but WSVM using kernel-based learning algorithm such as KPCM algorithm suffer from training complexity, expensive computation time and storage memory when noise data contaminate training data. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    A modified weighted support vector machine (WSVM) to reduce noise data in classification problem by Mohd Dzulkifli, Syarizul Amri

    Published 2021
    “…When noise exists in training data, the decision boundary of SVM would deviate from the optimal hyperplane severely. To overcome SVM drawback for noise data problem, WSVM using KPCM algorithm was used but WSVM using kernel-based learning algorithm such as KPCM algorithm suffer from training complexity, expensive computation time and storage memory when noise data contaminate training data. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    A Hybrid Sparrow Search Optimized Fractional Virtual Inertia Control for Frequency Regulation of Multi-Microgrid System by Fadheel B.A., Wahab N.I.A., Manoharan P., Mahdi A.J., Radzi M.A.B.M., Soh A.B.C., Ridha H.M., Alsoud A.R., Veerasamy V., Irudayaraj A.X.R., Alemu B.D.

    Published 2025
    “…The hybrid sparrow search and mountain gazelle optimizer algorithm (SSAMGO) optimizes the parameters for the three-loop controller. …”
    Article
  9. 9

    Quasi-Newton type method via weak secant equations for unconstrained optimization by Lim, Keat Hee

    Published 2021
    “…Motivated by the idea of memoryless scheme, the proposed formulas are further modified such that only vector computations and storage are required at every iteration. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Power System State Estimation In Large-Scale Networks by NURSYARIZAL MOHD NOR, NURSYARIZAL

    Published 2010
    “…The gain and the Jacobian matrices associated with the basic algorithm require large storage and have to be evaluated at every iteration, resulting in more computation time. …”
    Get full text
    Get full text
    Thesis
  11. 11

    SUDOKU HELPER by Abdul Razak, Muhammad Asyraf

    Published 2015
    “…In this paper research, author presents an algorithm to provide a tutorial for any Sudoku player who got stuck during the solving process. …”
    Get full text
    Get full text
    Final Year Project
  12. 12
  13. 13

    Development of an integrated scheduling model for handling equipment in automated port container terminals by Sadeghian, Syed Hamidreza

    Published 2014
    “…In addition, results proved that the modified meta-heuristic algorithm is able to find near optimal solutions and on average, the solutions found by the GA algorithm are only 0.2% worse than the optimal solutions and in the worst case in the test cases this difference is 2.3% which is acceptable. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  15. 15
  16. 16
  17. 17
  18. 18

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications by Hydara, Isatou

    Published 2015
    “…This research work was limited to Java based web applications. In future research, the method can be extended to include other programming languages as well as other similar web application security vulnerabilities.…”
    Get full text
    Get full text
    Thesis
  20. 20

    Human activity recognition via accelerometer and gyro sensors by Tee, Jia Lin

    Published 2023
    “…To implement the data engineering system proposed, two mobile applications, SensorData and SensorDataLogger with user-friendly interfaces and intuitive functionalities are developed using Java programming language and Android Studio. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis