Search Results - (( usage optimization modified algorithm ) OR ( java application during algorithm ))
Search alternatives:
- optimization modified »
- usage optimization »
- application during »
- java application »
- during algorithm »
-
1
Optimum grouping in a modified genetic algorithm for discrete-time, non-linear system identification
Published 2007“…The genetic algorithm approach is widely recognized as an effective and flexible optimization method for system identification. …”
Get full text
Get full text
Article -
2
Optimum grouping in a modified genetic algorithm for discrete-time, non-linear system identification
Published 2007“…he genetic algorithm approach is widely recognized as an effective and flexible optimization method for system identification. …”
Get full text
Get full text
Article -
3
Power line faults classification by neural network train by Ant Colony Optimization
Published 2017“…In this venture, the Ant Colony Optimization (ACO) calculation used to prepare neural system was studies, usage and tried with preparing issue. …”
Get full text
Get full text
Student Project -
4
Optimum grouping in a modified genetic algorithm for discrete-time, non-linear system identification
Published 2007“…The genetic algorithm approach is widely recognized as an effective and flexible optimization method for system identification. …”
Get full text
Get full text
Get full text
Get full text
Article -
5
OPTIMIZATION OF TWO FISH ENCRYPTION ALGORITHM ON FPGA
Published 2004“…For this project, 2 different optimized designs were implemented. The first design (Design I) was implemented with minimum hardware resources usage, using a single F -Function (modified) and was optimized with reasonable latency, throughput and throughput per gate. …”
Get full text
Get full text
Final Year Project -
6
Optimization Of Twofish Encryption Algorithm On FPGA
Published 2005“…For this project, 2 different optimized designs were implemented. The first design (Design I) was implemented with minimum hardware resources usage, using a single F -Function (modified) and was optimized with reasonable latency, throughput and throughput per gate. …”
Get full text
Conference or Workshop Item -
7
Bio-inspired computation: Recent development on the modifications of the cuckoo search algorithm
Published 2017“…Presently, the Cuckoo Search algorithm is attracting unprecedented attention from the research community and applications of the algorithm are expected to increase in number rapidly in the future. …”
Get full text
Get full text
Get full text
Get full text
Article -
8
Parametric modelling of a TRMS using dynamic spread factor particle swarm optimisation
Published 2009“…The proposed method formulates a modified inertia weight algorithm by using a dynamic spread factor (SF). …”
Get full text
Get full text
Get full text
Proceeding Paper -
9
Hyper-heuristic strategies for optimal power flow problem with FACTS devices allocation in wind power integrated system
Published 2024“…The usage of HHH solving the OPF problem is tested on the modified IEEE 30 bus system that integrates the thermal generators with the wind power. …”
Get full text
Get full text
Get full text
Article -
10
Quality of service and scheduling performance optimization in LTE networks / Abubakar Auwal Idris
Published 2017“…This research proposed an optimal downlink scheduling algorithm called Video Real-Time Scheduling Algorithm (VRTSA) to support real-time traffic of video in LTE network. …”
Get full text
Get full text
Get full text
Thesis -
11
SUDOKU HELPER
Published 2015“…In this paper research, author presents an algorithm to provide a tutorial for any Sudoku player who got stuck during the solving process. …”
Get full text
Get full text
Final Year Project -
12
Solar Photovoltaic Maximum Power Point Tracking via Predictive Technique
Published 2022“…The potential combination gained from P-V and I-V curves could be referred to develop the optimization system. Hence, from this information, the optimal output voltage, current and power can be delivered from the PV panel. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
13
A krill herd behaviour inspired load balancing of tasks in cloud computing
Published 2017“…The speed, task cost, and weight of the tasks were first determined, after which, the Krill herd optimization algorithm was for the load balancing based on the measured parameters. …”
Get full text
Get full text
Get full text
Get full text
Article -
14
Energy Management System For Controlling Series Hybrid Electric Motorcycle
Published 2016“…The series hybrid electric motorcycle embedded with the energy management system achieves 89.58 km per charging compared to 19.30 km per charging for the electric motorcycle under the modified ECE-R40 drive cycle. In addition, the energy management system outperformed the conventional thermostat control strategy in terms of traveling distance and it has more optimized fuel usage. …”
Get full text
Get full text
Thesis -
15
Improving spectrum efficiency on cognitive radio spectrum sensing with enhanced diversity concept / Mohsen Akbari
Published 2016“…At the first step, this research proposes an analytical study on the optimality of common soft decision fusion (SDF) cooperative spectrum sensing (CSS) and decision based on the modified imperialistic competitive algorithm (ICA) at which low total probability of error (…”
Get full text
Get full text
Thesis -
16
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
17
-
18
-
19
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
20
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
Published 2015“…This research work was limited to Java based web applications. In future research, the method can be extended to include other programming languages as well as other similar web application security vulnerabilities.…”
Get full text
Get full text
Thesis
