Search Results - (( usage optimization modified algorithm ) OR ( java application during algorithm ))

Refine Results
  1. 1

    Optimum grouping in a modified genetic algorithm for discrete-time, non-linear system identification by Jamaluddin, Hishamuddin, Abd. Samad, M. F., Ahmad, Robiah, Yaacob, M. S.

    Published 2007
    “…The genetic algorithm approach is widely recognized as an effective and flexible optimization method for system identification. …”
    Get full text
    Get full text
    Article
  2. 2

    Optimum grouping in a modified genetic algorithm for discrete-time, non-linear system identification by Jamaluddin, H., Samad, M. F. A., Ahmad, R., Yaacob, M. S.

    Published 2007
    “…he genetic algorithm approach is widely recognized as an effective and flexible optimization method for system identification. …”
    Get full text
    Get full text
    Article
  3. 3

    Power line faults classification by neural network train by Ant Colony Optimization by Nasirudin, Mohd Syafiq

    Published 2017
    “…In this venture, the Ant Colony Optimization (ACO) calculation used to prepare neural system was studies, usage and tried with preparing issue. …”
    Get full text
    Get full text
    Student Project
  4. 4

    Optimum grouping in a modified genetic algorithm for discrete-time, non-linear system identification by Abd Samad, Md Fahmi

    Published 2007
    “…The genetic algorithm approach is widely recognized as an effective and flexible optimization method for system identification. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    OPTIMIZATION OF TWO FISH ENCRYPTION ALGORITHM ON FPGA by DORE RAJA, ANAND A RAJA

    Published 2004
    “…For this project, 2 different optimized designs were implemented. The first design (Design I) was implemented with minimum hardware resources usage, using a single F -Function (modified) and was optimized with reasonable latency, throughput and throughput per gate. …”
    Get full text
    Get full text
    Final Year Project
  6. 6

    Optimization Of Twofish Encryption Algorithm On FPGA by Raja, Ananda Raja Dore, Zain Ali, Noohul Basheer, Hussin, Fawnizu Azmadi

    Published 2005
    “…For this project, 2 different optimized designs were implemented. The first design (Design I) was implemented with minimum hardware resources usage, using a single F -Function (modified) and was optimized with reasonable latency, throughput and throughput per gate. …”
    Get full text
    Conference or Workshop Item
  7. 7

    Bio-inspired computation: Recent development on the modifications of the cuckoo search algorithm by Haruna, Chiroma, Herawan, Tutut, Iztok, Fister Jr, Iztok, Fister, Abdulkareem, Sameem, Shuib, Liyana, Mukhtar, Fatihu Hamza, Younes, Saadi, Abubakar, Adamu

    Published 2017
    “…Presently, the Cuckoo Search algorithm is attracting unprecedented attention from the research community and applications of the algorithm are expected to increase in number rapidly in the future. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Parametric modelling of a TRMS using dynamic spread factor particle swarm optimisation by Toha, Siti Fauziah, Abd Latiff, I., Mohamad, M., Tokhi, M Osman

    Published 2009
    “…The proposed method formulates a modified inertia weight algorithm by using a dynamic spread factor (SF). …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  9. 9

    Hyper-heuristic strategies for optimal power flow problem with FACTS devices allocation in wind power integrated system by Mohd Herwan, Sulaiman, Zuriani, Mustaffa

    Published 2024
    “…The usage of HHH solving the OPF problem is tested on the modified IEEE 30 bus system that integrates the thermal generators with the wind power. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Quality of service and scheduling performance optimization in LTE networks / Abubakar Auwal Idris by Abubakar Auwal , Idris

    Published 2017
    “…This research proposed an optimal downlink scheduling algorithm called Video Real-Time Scheduling Algorithm (VRTSA) to support real-time traffic of video in LTE network. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    SUDOKU HELPER by Abdul Razak, Muhammad Asyraf

    Published 2015
    “…In this paper research, author presents an algorithm to provide a tutorial for any Sudoku player who got stuck during the solving process. …”
    Get full text
    Get full text
    Final Year Project
  12. 12

    Solar Photovoltaic Maximum Power Point Tracking via Predictive Technique by ‘Ainaa Nur Batrisyia binti Abdul Rahman, -

    Published 2022
    “…The potential combination gained from P-V and I-V curves could be referred to develop the optimization system. Hence, from this information, the optimal output voltage, current and power can be delivered from the PV panel. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  13. 13

    A krill herd behaviour inspired load balancing of tasks in cloud computing by Hasan, Raed Abdulkareem, Mohammed, Muamer N.

    Published 2017
    “…The speed, task cost, and weight of the tasks were first determined, after which, the Krill herd optimization algorithm was for the load balancing based on the measured parameters. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Energy Management System For Controlling Series Hybrid Electric Motorcycle by Cham , Chin Long

    Published 2016
    “…The series hybrid electric motorcycle embedded with the energy management system achieves 89.58 km per charging compared to 19.30 km per charging for the electric motorcycle under the modified ECE-R40 drive cycle. In addition, the energy management system outperformed the conventional thermostat control strategy in terms of traveling distance and it has more optimized fuel usage. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Improving spectrum efficiency on cognitive radio spectrum sensing with enhanced diversity concept / Mohsen Akbari by Mohsen, Akbari

    Published 2016
    “…At the first step, this research proposes an analytical study on the optimality of common soft decision fusion (SDF) cooperative spectrum sensing (CSS) and decision based on the modified imperialistic competitive algorithm (ICA) at which low total probability of error (…”
    Get full text
    Get full text
    Thesis
  16. 16

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  17. 17
  18. 18
  19. 19

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications by Hydara, Isatou

    Published 2015
    “…This research work was limited to Java based web applications. In future research, the method can be extended to include other programming languages as well as other similar web application security vulnerabilities.…”
    Get full text
    Get full text
    Thesis