Search Results - (( variable selection parallel algorithm ) OR ( java application customization algorithm ))
Search alternatives:
- customization algorithm »
- selection parallel »
- java application »
- variable »
-
1
Intelligent classification algorithms in enhancing the performance of support vector machine
Published 2019“…This paper presents two intelligent algorithms that hybridized between ant colony optimization (ACO) and SVM for tuning SVM parameters and selecting feature subset without having to discretize the continuous values. …”
Get full text
Get full text
Get full text
Article -
2
Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things
Published 2022“…Here, the memory consumption can be reduced by enabling a feature selection algorithm that excludes nonrelevant features and preserves the relevant ones. the algorithm is developed based on the variable length of the PSO. …”
Get full text
Get full text
Thesis -
3
Hybrid ANN and Artificial Cooperative Search Algorithm to Forecast Short-Term Electricity Price in De-Regulated Electricity Market
Published 2019“…Therefore, this research proposes a hybrid method for electricity price forecasting via artificial neural network (ANN) and artificial cooperative search algorithm (ACS). In parallel, a feature selection technique based on the combination of mutual information (MI) and neural network (NN) is developed in this study to select the input variables subsets, which have substantial impact on forecasting of electricity price. …”
Get full text
Get full text
Article -
4
A Fast Scheduling Algorithm for WDM Optical Networks
Published 2000“…This time complexity can be improved to O(log3 N) by parallel processing using O(M) processors. Two variations of implementation of the scheduling algorithm have been proposed, namely the Variable Frame Size (VFS) and Limited Frame Size (LFS) schemes. …”
Get full text
Get full text
Thesis -
5
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
6
Three-point Block Algorithm For Approximating Duffing Type Differential Equations
Published 2024journal::journal article -
7
Process Planning Optimization In Reconfigurable Manufacturing Systems
Published 2008“…The five (5) AADTs include; a variant of the simulated annealing algorithm that implements heuristic knowledge at critical decision points, two (2) cooperative search schemes based on a “loose hybridization” of the Boltzmann Machine algorithm with (i) simulated annealing, and (ii) genetic algorithm search techniques, and two (2) modified genetic algorithms. …”
Get full text
Get full text
Thesis -
8
Development of a multi-objective optimization model for transport and environment in a closed-loop automotive supply chain
Published 2014“…In the last stage, an extended Gravitational Search Algorithm (GSA) as a parallel search algorithm and high convergence rate into high quality final solutions is used to solve the proposed mathematical model and to achieve the Pareto set of solution. …”
Get full text
Get full text
Thesis -
9
On line fault detection for transmission line using power system stabilizer signals
Published 2007“…Hence, this study will show that not only the PSS able to compensate the damping due to the disturbance but also by using the developed algorithm it succeeds to detect and classify the fault conditions on the parallel transmission lines.…”
Get full text
Get full text
Thesis -
10
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
-
12
Cryptanalysis on the modulus N=p2q and design of rabin-like cryptosystem without decryption failure
Published 2015“…In this thesis, we also develop a new cryptographic hard problem based on a special instance of a linear Diophantine equation in two variables, with some provided restrictions and carefully selected parameters. …”
Get full text
Get full text
Thesis -
13
Investigating computational thinking among primary school students in Terengganu using visual programming
Published 2022“…Quantitative approach was used to measure student’s CT skills of Flow Control, Abstraction, Parallelism, Decomposition, Synchronization, User Interactivity and Logic from their computational artifacts. …”
Get full text
Get full text
Thesis
