Search Results - (( its application based algorithm ) OR ( code application genetic algorithms ))*

Refine Results
  1. 1
  2. 2

    Task scheduling in cloud computing using hybrid genetic algorithm and bald eagle search (GA-BES) by Kamal Khairi Supaprhman

    Published 2022
    “…The genetic algorithm was widely used because of its accuracy and simplicity. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  3. 3
  4. 4
  5. 5

    Harmony search-based robust optimal controller with prior defined structure by Rafieishahemabadi, Ali

    Published 2013
    “…For further assessment, the proposed design strategy is then employed to design a control law for an electrical DC drive velocity controller used as a benchmark problem for the recent PSO-based and genetic algorithm optimization (GAO)-based robust controllers. …”
    Get full text
    Get full text
    Thesis
  6. 6

    A review of crossover methods and problem representation of genetic algorithm in recent engineering applications by Zainuddin, Farah Ayiesya, Abd Samad, Md Fahmi

    Published 2020
    “…GA has many variations such as real coded and binary coded depending on the problem representation and so affects the forms of genetic operators. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11

    A spatial decision support system framework for optimization of cropping pattern and water resources allocation at pasargard plains, fars province, Iran by Ghasemi, Mohammad Mehdi

    Published 2014
    “…The proposed GA-based optimization model—namely Piece-Wise Genetic Algorithm (PWGA)—was capable of proposing optimal cropping patterns, deficit irrigation rules, and conjunctive use decisions for each farm, and to tackle the large number of decision variables involved. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18

    Enhancing XSS vulnerability detection and removal in web applications using genetic algorithms by Hydara, Isatou

    Published 2024
    “…Another limitation is the limited or lack of focus on the removal of XSS vulnerabilities after their detection in the source code. Consequently, an approach called XSS-DETREM has been proposed with the objectives of combining genetic algorithms with static analysis, and a code replacement technique to detect and remove XSS vulnerabilities, respectively, to address the problem of XSS at the source code level. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Selective harmonic elimination (SHE) based 3-phase multilevel voltage source inverter (VSI) for standalone applications by Shanono, Ibrahim Haruna, Nor Rul Hasma, Abdullah, Hamdan, Daniyal, Aisha, Muhammad

    Published 2019
    “…With the fundamental switching SHE-PWM, twelve non-linear, transcendental equations are generated, and they are optimally solved using the Hybrid Coded Genetic Algorithm to eliminate 11 (n − 1) lower-order harmonics. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    An approach for cross-site scripting detection and removal based on genetic algorithms. by Hydara, Isatou, Md Sultan, Abu Bakar, Zulzalil, Hazura, Admodisastro, Novia

    Published 2014
    “…However, the problem of cross-site scripting vulnerabilities present in web applications still persists. In this paper, we propose to explore an approach based on genetic algorithms that will be able to detect and remove cross-site scripting vulnerabilities from the source code before an application is deployed. …”
    Get full text
    Get full text
    Conference or Workshop Item