Search Results - (( basic optimisation based algorithm ) OR ( _ evaluating using algorithm ))

Refine Results
  1. 1

    Instance matching framework for heterogeneous semantic web content over linked data environment by Mansir, Abubakar

    Published 2021
    “…The output of each algorithm is evaluated, the results have shown that each algorithm performs well and outperforms the existing algorithms on all test cases in terms better output generation and effective handling of heterogeneity from different domains, which is a necessary concern in all data-intensive problems. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3
  4. 4

    Local search manoeuvres recruitment in the bees algorithm by Muhamad, Zaidi, Mahmuddin, Massudi, Nasrudin, Mohammad Faidzul, Sahran, Shahnorbanun

    Published 2011
    “…Swarm intelligence of honey bees had motivated many bioinspired based optimisation techniques. The Bees Algorithm (BA) was created specifically by mimicking the foraging behavior of foraging bees in searching for food sources.During the searching, the original BA ignores the possibilities of the recruits being lost during the flying.The BA algorithm can become closer to the nature foraging behavior of bees by taking account of this phenomenon.This paper proposes an enhanced BA which adds a neighbourhood search parameter which we called as the Local Search Manoeuvres (LSM) recruitment factor.The parameter controls the possibilities of a bee extends its neighbourhood searching area in certain direction.The aim of LSM recruitment is to decrease the number of searching iteration in solving optimization problems that have high dimensions.The experiment results on several benchmark functions show that the BA with LSM performs better compared to the one with basic recruitment.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Unit commitment in power system using multi-agent evolutionary programming incorporating priority listing optimisation technique / Muhammad Nazree Che Othman by Che Othman, Muhammad Nazree

    Published 2013
    “…The search process then being refined using heuristic EP-based algorithm with multi-agent approach to produce the final solution. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Assignation of PSM evaluator using genetic algorithm by Yap, Suet Lee

    Published 2012
    “…The purpose of this paper is to present a design of development for Assignation of PSM Evaluator using Genetic Algorithm(APEGA)system.This is an application system that is used to assist the Faculty of Computer System and Software Engineering(FSKKP)of University Malaysia Pahang(UMP)in matching the optimum evaluators for the students in PSM presentation carnival.In the methodology part,a development model which involves with client participation is designed in order to use in the development of this project.The target user of the system is PSM coordinator who is responsible in assigning the PSM evaluator.Assignation of PSM Evaluator using Genetic Algorithm APEGA)is expected to be able in developing a well-distributed matching and overcoming the relevant constraints in an intelligent way. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  8. 8

    Evaluation of Visual Network Algorithms on Historical Documents by Khairunnisa, Binti Ibrahim

    Published 2020
    “…The framework has been used to evaluate three graph layout and three graph clustering algorithms on the historical SAGA dataset. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Sudoku Generator based on hybrid algorithm / Faridah Abdul Rahman by Abdul Rahman, Faridah

    Published 2012
    “…Before this, Sudoku generator has been develop using backtracking algorithm only, but this research use two algorithm which is recursive and backtracking algorithm that called as hybrid algorithm. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Evaluation of MLP-ANN Training Algorithms for Modeling Soil Pore-Water Pressure Responses to Rainfall by Mustafa, M.R., Rezaur, R.B., Saiedi, Saied, Rahardjo, H., Isa, M.H.

    Published 2013
    “…The performance of the training algorithms was evaluated using standard performance evaluation measures—root mean square error, coefficient of efficiency, and the time and number of epochs required to reach a predefined accuracy. …”
    Get full text
    Get full text
    Citation Index Journal
  11. 11

    Objective evaluation of speech enhancement using compressive sensing algorithm by Sulong, Amart, Gunawan, Teddy Surya, Khalifa, Othman Omran, Chebil, Jalel

    Published 2013
    “…Perceptual evaluation of speech quality (PESQ) is an objective evaluation of speech enhancement algorithm used to measure the enhanced speech quality. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  12. 12

    Validation on an enhanced dendrite cell algorithm using statistical analysis by Mohamad Mohsin, Mohamad Farhan, Hamdan, Abdul Razak, Abu Bakar, Azuraliza, Abd Wahab, Mohd Helmy

    Published 2017
    “…This study demonstrates the mechanism of evaluating an enhanced algorithm using performance metrics and validated it using statistical analysis. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Evaluation of Lightning Current Using Inverse Procedure Algorithm. by Ab Kadir, Mohd Zainal Abidin, Izadi, Mahdi, Askari, Mohamad Tolou, Hajikhani, Maryam

    Published 2013
    “…In this study an inverse procedure algorithm is proposed in the time domain to evaluate lightning return stroke current based on measured electromagnetic fields at an observation point. …”
    Get full text
    Get full text
    Article
  14. 14

    Performance evaluation of marker recognition algorithm for mobile augmented reality in the real environment by Siok, Yee Tan, Haslina Arshad

    Published 2023
    “…BRISK detector, FREAK descriptor, and Hamming distance matcher algorithms are implemented in a mobile AR application in order to evaluate the AR algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15
  16. 16

    Logic Algorithm for contour following task: An evaluation using Adept SCARA Robot by Anton, S P, Samsi , Md. Said, M.A., Burhanuddin

    Published 2010
    “…This paper presents the performance evaluation of logic algorithms for contourfollowing task in order to automate the manual programming process. …”
    Get full text
    Get full text
    Article
  17. 17

    Unifying the evaluation criteria of many objectives optimization using fuzzy Delphi method by Mohammed, Rawia Tahrir, Yaakob, Razali, Mohd Sharef, Nurfadhlina, Abdullah, Rusli

    Published 2021
    “…Although many evaluation criteria are available, yet most of the evaluation and benchmarking of the MaOO with state-of-art algorithms perform using one or two performance indicators without clear evidence or justification of the efficiency of these indicators over others. …”
    Get full text
    Get full text
    Article
  18. 18

    Evaluation of a spacecraft attitude and rate estimation algorithm by Abdullah, Mohammad Nizam Filipski, Varatharajoo, Renuganth

    Published 2010
    “…Practical implications: Because the simulation set‐up is clearly stated, the results of this evaluation can be used as a benchmark for other estimation algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Vector Evaluated Gravitational Search Algorithm (VEGSA) for multi-objective optimization problems by Zuwairie, Ibrahim, Badaruddin, Muhammad, Kamarul Hawari, Ghazali, Lim, Kian Sheng, Sophan Wahyudi, Nawawi, Zulkifli, Md. Yusof

    Published 2012
    “…The proposed algorithm, which is called Vector Evaluated Gravitational Search Algorithm (VEGSA), uses a number of populations of particles. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Evaluation of feature selection algorithm for android malware detection by Mazlan, Nurul Hidayah, A Hamid, Isredza Rahmi

    Published 2018
    “…This paper synthesizes an evaluation of feature selection algorithm by utilizing Term Frequency Inverse Document Frequency (TF-IDF) as the main algorithm in Android malware detection. …”
    Get full text
    Article