Search Results - (( using composition modified algorithm ) OR ( java application during algorithm ))

Refine Results
  1. 1
  2. 2

    Optimum grouping in a modified genetic algorithm for discrete-time, non-linear system identification by Jamaluddin, Hishamuddin, Abd. Samad, M. F., Ahmad, Robiah, Yaacob, M. S.

    Published 2007
    “…One of the strategies applied is the modified genetic algorithm which relies on, among other things, the separation of the population into groups where each group undergoes mutual recombination operations. …”
    Get full text
    Get full text
    Article
  3. 3

    Optimum grouping in a modified genetic algorithm for discrete-time, non-linear system identification by Jamaluddin, H., Samad, M. F. A., Ahmad, R., Yaacob, M. S.

    Published 2007
    “…One of the strategies applied is the modified genetic algorithm which relies on, among other things, the separation of the population into groups where each group undergoes mutual recombination operations. …”
    Get full text
    Get full text
    Article
  4. 4

    Experimental studies on impact damage location in composite aerospace structures using genetic algorithms and neural networks by Mahzan, Shahruddin, J. Staszewski, Wieslaw, Worden, Keith

    Published 2010
    “…This paper compares two advanced signal processing methods for impact location in composite aircraft structures. The first method is based on a modified triangulation procedure and Genetic Algorithms whereas the second technique applies Artificial Neural Networks. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Optimum grouping in a modified genetic algorithm for discrete-time, non-linear system identification by Abd Samad, Md Fahmi

    Published 2007
    “…One of the strategies applied is the modified genetic algorithm which relies on, among other things, the separation of the population into groups where each group undergoes mutual recombination operations. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    SUDOKU HELPER by Abdul Razak, Muhammad Asyraf

    Published 2015
    “…In this paper research, author presents an algorithm to provide a tutorial for any Sudoku player who got stuck during the solving process. …”
    Get full text
    Get full text
    Final Year Project
  7. 7
  8. 8

    A modified strength capacity for composite slab using reliability approach by Mohammed, Kachalla

    Published 2016
    “…Hence, variable deection, _defl and shear resistance, _prop factors are introduced to modify the existing limit state. Similarly, a procedural algorithm lead to the development of pro_led composite slab strength determination function for both longitudinal shear estimation methods by considering section slenderness and deck characteristics. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Predicting the rutting parameters of nanosilica/waste denim fiber composite asphalt binders using the response surface methodology and machine learning methods by Al-Sabaeei, Abdulnaser M., Alhussian, Hitham, Abdulkadir, Said Jadid, Giustozzi, Filippo, Mohd Jakarni, Fauzan, Md Yusoff, Nur Izzi

    Published 2023
    “…The study conducts an extensive investigation using ML algorithms to accurately predict the multiple stress creep recovery (MSCR) rutting parameters for the base and modified asphalt binders. …”
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  13. 13

    Structural assessment of damaged and CFRP repaired reinforced concrete beams from experimental modal analysis / Moatasem Mohammed Fayyadh by Moatasem, Mohammed Fayyadh

    Published 2012
    “…Previous studies have used modal parameters for damage detection and the assessment of repair work, and showed that existing algorithms used for damage detection sometimes produced inaccuracies and anomalies. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15
  16. 16

    Performance assessment of Sn-based lead-free solder composite joints based on extreme learning machine model tuned by Aquila optimizer by Temitope T., Dele-Afolabi, Masoud, Ahmadipour, Mohamed Ariff, Azmah Hanim, A.A., Oyekanmi, M.N.M., Ansari, Sikiru, Surajudeen, Kumar, Niraj

    Published 2024
    “…An extreme learning machine (ELM) prediction approach refined by Aquila optimizer (AO), a new cutting-edge metaheuristic optimization algorithm was utilized to develop a prediction model for the performance assessment of the developed solder composites. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    Optimization and control of hydro generation scheduling using hybrid firefly algorithm and particle swarm optimization techniques by Hammid, Ali Thaeer

    Published 2018
    “…Secondly, this approach hybridizing the FA with the rough algorithm (RA), where RA is used to control the steps of randomness for the FA while optimizing the weights of the standard BPNN model. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Recovery of tree community composition across different types of anthropogenic disturbances and characterization of their effect using Landsat time series in Bornean tropical monta... by Keiko Ioki, Daniel James, Phua, Mui How, Satoshi Tsuyuki, Nobuo Imai

    Published 2022
    “…We also investigated the use of metrics from spectral trajectories of a Landsat time series (LTS) change detection algorithm (LandTrendr) to identify characteristics of disturbance events and their linkage to the recovery of tree community composition, with field validation. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
    Get full text
    Get full text
    Get full text
    Thesis