Search Results - (( using optimization methods algorithm ) OR ( software version method algorithm ))
Search alternatives:
- optimization methods »
- methods algorithm »
- method algorithm »
- version method »
-
1
Application of genetic algorithm for optimal voltage control of the power system / Mohd Supian Yahya
Published 1998“…This project uses genetic algorithm (GA) for optimal voltage control of the power system and automatically will minimum a system loss. …”
Get full text
Get full text
Thesis -
2
Enhancing three variants of harmony search algorithm for continuous optimization problems
Published 2021“…Meta-heuristic algorithms are well-known optimization methods, for solving real-world optimization problems. …”
Get full text
Get full text
Get full text
Article -
3
A modified n-th section line search in conjugate gradient methods for solving unconstrained optimization / Muhammad Imza Fakhri Jinudin
Published 2018“…All algorithms are written and executed using Maple 16 software. …”
Get full text
Get full text
Thesis -
4
Voting algorithms for large scale fault-tolerant systems
Published 2011“…To solve this problem and gain benefits of this algorithm, we employed parallel algorithm technique and by using optimal number of processors, we could propose optimal algorithms known as Parallel Average Voting and Parallel Weighted Average Voting which both have optimal time complexity and less calculation cost. …”
Get full text
Get full text
Thesis -
5
An enhanced version of black hole algorithm via levy flight for optimization and data clustering problems
Published 2019“…Recently, nature-inspired algorithms have been proposed and utilized for solving the optimization problems in general, and data clustering problem in particular. …”
Get full text
Get full text
Get full text
Article -
6
High Rise Building Evacuation Route Model Using DIJKSTRA'S Algorithm
Published 2015“…The main algorithms involve is Dijkstra’s algorithm and then an Ant Colony Optimization algorithm is used as hybrid versions of Dijkstra’s algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Regression test case selection & prioritization using dependence graph and genetic algorithm
Published 2014“…The challenge in regression testing is the selection of best test cases from the existing test suite.This paper presents an evolutionary regression test case prioritization for object-oriented software based on extended system dependence graph model of the affected program using genetic algorithm. The approach is based on optimization of selected test case from dependency analysis of the source codes. …”
Get full text
Get full text
Article -
8
Design of DNA fragment assembly using IWP method on application-specific integrated-circuit / Hasniliati Hassan
Published 2017“…The method proposed is to design DNA assembly algorithms in Verilog HDL and implemented it in ASIC design flow. …”
Get full text
Get full text
Thesis -
9
Optimal load shedding in power system using firefly algorithm
Published 2024text::Final Year Project -
10
Optimizing skyline query processing in incomplete data
Published 2019“…Hence, missing data pose new challenges if the processing skyline queries cannot easily apply those methods that are designed for complete data. This is due to the fact that imperfect data cause the loss of the transitivity property of the skyline method and cyclic dominance. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
11
Detecting and evaluating surface crack defect of building structure and infrastructure elements using Digital Image Processing approach / Nursyafiqah Razmi
Published 2018“…Therefore, an innovative technique that manipulating the Digital Image Processing technology was developed to detect and estimate the surface crack length on civil engineering structures by using images that is not depending on inspector's background on crack assessment. The thresholding algorithm was developed to detect the crack area and estimate the crack length by using MATLAB version 2015a and 2017a software. …”
Get full text
Get full text
Student Project -
12
Radiation dose, cancer risk and diagnostic performance of computed tomography pulmonary angiography examination
Published 2021“…Images obtained were reconstructed with the IR algorithm (levels 3, 4 and 5). Diagnostic performance was quantified objectively by imQuest software (version 7.1, Duke University, USA). …”
Get full text
Get full text
Thesis -
13
Application of genetic algorithm methods to optimize flowshop sequencing problem
Published 2008“…Genetic algorithm method was one of the methods that were widely used in solving optimization problem. …”
Get full text
Get full text
Undergraduates Project Papers -
14
Improving collection of data type evidence and the integrity of evidence collected using SHA-256 hashing algorithm for web browsers
Published 2024“…The existing tools for evidence collection primarily rely on SHA-1 hashing and using older version windows and software toolkits version. Therefore, this study proposes the addition in toolkits implementation, the latest software tools version and the latest solution, an improvement proof-of-concept utilizes SHA-256 hashing algorithm to improve the collection of evidence and enhance integrity. …”
Get full text
Get full text
Get full text
Article -
15
Sizing optimization of large-scale grid connected photovoltaic system using dolphin echolocation algorithm / Muhammad Zakyizzuddin Rosselan
Published 2018“…Later, an Iterative-based Sizing Algorithm (ISA) was developed to determine the optimal sizing solution which was later used as benchmark for sizing algorithms using optimization methods. …”
Get full text
Get full text
Thesis -
16
An improved method using fuzzy system based on hybrid boahs for phishing attack detection
Published 2022“…Moreover, Butterfly Optimization Algorithm and Harmony Search Algorithm were combined as optimization method led to a new method named BOAHS. …”
Get full text
Get full text
Thesis -
17
Security mechanism for wireless Mobile Ad Hoc Networks (MANET)
Published 2006“…This report provides an overview of wireless ad hoc networks, wireless threats, cryptography background and the security algorithms for this encryption method. The One Time Pad algorithm and Caesar Cipher algorithms are implemented using LabVIEW software. …”
Get full text
Get full text
Student Project -
18
Wind farm reactive power optimization by using imperialist competitive algorithm
Published 2013“…In this paper a new evolutionary computing method based on imperialist competitive algorithm (ICA) is used for optimization of the reactive power in a wind farm. …”
Get full text
Get full text
Conference or Workshop Item -
19
SA-EVPS ALGORITHM FOR DISCRETE SIZE OPTIMIZATION OF THE 582-BAR SPATIAL TRUSS STRUCTURE
Published 2023“…Nowadays, approximate optimization methods are widely used. This study utilized the Self Adaptive Enhanced Vibrating Particle System (SA-EVPS) algorithm as an approximate optimization method, since the EVPS algorithm requires experimental parameters. …”
Get full text
Get full text
Article -
20
VLSI floor planning optimization using genetic algorithm and cross entropy method / Angeline Teoh Szu Fern
Published 2012“…Two methods of optimization are used for CBLL. They are Cross Entropy and also Genetic Algorithm. …”
Get full text
Get full text
Thesis
