Search Results - (( java application interface algorithm ) OR ( whale evaluation method algorithm ))

Refine Results
  1. 1

    Inversed Control Parameter in Whale Optimization Algorithm and Grey Wolf Optimizer for Wrapper-Based Feature Selection: A Comparative Study by Li Yu Yab, Li Yu Yab, Wahid, Noorhaniza, A Hamid, Rahayu

    Published 2023
    “…—Whale Optimization Algorithm (WOA) and Grey Wolf Optimizer (GWO) are well-perform metaheuristic algorithms used by various researchers in solving feature selection problems. …”
    Get full text
    Get full text
    Article
  2. 2

    Inversed Control Parameter in Whale Optimization Algorithm and Grey Wolf Optimizer for Wrapper-Based Feature Selection: A Comparative Study by Li Yu Yab, Li Yu Yab, Wahid, Noorhaniza, A Hamid, Rahayu

    Published 2023
    “…Whale Optimization Algorithm (WOA) and Grey Wolf Optimizer (GWO) are well-perform metaheuristic algorithms used by various researchers in solving feature selection problems. …”
    Get full text
    Get full text
    Article
  3. 3

    Optimizing decentralized exam timetabling with a discrete whale optimization algorithm by Emily Sing Kiang Siew, San nah sze, Say leng goh

    Published 2025
    “…—In recent years, there has been increasing interest in intelligent optimization algorithms, such as the Whale Optimization Algorithm (WOA). …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Optimizing Decentralized Exam Timetabling with a Discrete Whale Optimization Algorithm by Emily Siew, Sing Kiang, Sze, San Nah, Goh, Say Leng

    Published 2025
    “…In recent years, there has been increasing interest in intelligent optimization algorithms, such as the Whale Optimization Algorithm (WOA). …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    The influence of sentiments in digital currency prediction using hybrid sentiment-based Support Vector Machine with Whale Optimization Algorithm (SVMWOA) by Hitam, Nor Azizah, Ismail, Amelia Ritahani, Samsudin, Ruhaidah, Ameerbakhsh, Omair

    Published 2021
    “…The proposed Hybrid Sentiment-based Support Vector Machine with a Whale Optimization Algorithm (SVMWOA). will be evaluated and compared based on performance measures. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  6. 6

    Improving amphetamine-type stimulants drug classification using chaotic-based time-varying binary whale optimization algorithm by Draman @ Muda, Azah Kamilah, Mohd Yusof, Norfadzlia, Pratama, Satrya Fajri, Carbo-Dorca, Ramon, Abraham, Ajith

    Published 2022
    “…Specific high-dimensional molecular descriptors of ATS and non-ATS drugs were employed to evaluate the efficiency of the proposed algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Variable Neighborhood Descent and Whale Optimization Algorithm for Examination Timetabling Problems at Universiti Malaysia Sarawak by Emily Sing Kiang, Siew

    Published 2025
    “…A constructive algorithm was developed to generate an initial feasible solution, which was subsequently refined using two primary approaches to evaluate their efficiency: Iterative Threshold Pipe Variable Neighborhood Descent (IT-PVND), and a modified Whale Optimization Algorithm (WOA). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Hybrid binary whale with harris hawks for feature selection by Alwajih, R., Abdulkadir, S.J., Al Hussian, H., Aziz, N., Al-Tashi, Q., Mirjalili, S., Alqushaibi, A.

    Published 2022
    “…As a result, feature selection is offered as a method for eliminating unwanted characteristics. This study introduces the BWOAHHO memetic technique, which combines the binary hybrid Whale Optimization Algorithm (WOA) with Harris Hawks Optimization (HHO). …”
    Get full text
    Get full text
    Article
  9. 9

    Real-time algorithmic music composition application. by Yap, Alisa Yi Hui

    Published 2022
    “…In addition, the system also utilises JavaFx and jFugue for its graphical user interface and music programming respectively. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  10. 10

    Application-Programming Interface (API) for Song Recognition Systems by Murtadha Arif Sahbudin, Chakib Chaouch, Salvatore Serrano

    Published 2024
    “…In addition the implementation is done by algorithm using Java’s programming language, executed through an application developed in the Android operating system. …”
    Article
  11. 11

    Visdom: Smart guide robot for visually impaired people by Lee, Zhen Ting

    Published 2025
    “…The system architecture integrates ROS 2 on a Raspberry Pi, with TCP/IP connectivity enabling remote operation. An Android mobile application, developed using Java and the java.net.Socket library, provides an intuitive and accessible user interface for seamless interaction with the robot. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  12. 12

    Hybrid feature selection of microarray prostate cancer diagnostic system by Mohd Ali, Nursabillilah, Hanafi, Ainain Nur, Karis, Mohd Safirin, Shamsudin, Nur Hazahsha, Shair, Ezreen Farina, Abdul Aziz, Nor Hidayati

    Published 2024
    “…This work proposes a new hybrid feature selection method, namely the relief-F (RF)-genetic algorithm (GA) with support vector machine (SVM) classification method. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  13. 13
  14. 14

    Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework by Asaad Aref, Ibrahim

    Published 2004
    “…A design proposal was outlined to provide an adaptive client/server approach to stream audio contents using Real-Time Transport Protocol (RTP) involving architecture based on the Java Media Framework (JMF) Application Programmable Interfaces (API).RTP protocol is the Internet-standard protocol for the transport of real-time data, including audio and video and can be implemented by using Java Media Framework (JMF). …”
    Get full text
    Get full text
    Thesis
  15. 15

    Improved swarm intelligence algorithms with time-varying modified Sigmoid transfer function for Amphetamine-type stimulants drug classification by Muda, Azah Kamilah, Mohd Yusof, Norfadzlia, Pratama, Satrya Fajri, Carbo-Dorca, Ramon, Abraham, Ajith

    Published 2022
    “…In this article, a new time-varying modified Sigmoid transfer function with two time-varying updating schemes is proposed as the binarization method for particle swarm optimization (PSO), grey wolf optimization algorithm (GWO), whale optimization algorithm (WOA), harris hawk optimization (HHO), and manta-ray foraging optimization (MRFO). …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16
  17. 17

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  18. 18

    Feature Selection Based on Grey Wolf Optimizer for Oil Gas Reservoir Classification by Al-Tashi, Q., Rais, H.M., Abdulkadir, S.J., Mirjalili, S.

    Published 2020
    “…The wrapper K-Nearest Neighbors (KNN) classifier is used to evaluate the selected features. In addition, to examine the efficiency of the proposed method, two recent algorithms namely: Whale Optimization algorithm (WAO) and Dragonfly Algorithm (DA) are implemented for comparison. …”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…The application is designed to satisfy the user friendly interfaces and intent to be used by the end user without having the advanced knowledge in mobile security. …”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20