Search Results - (( develop computer pollination algorithm ) OR ( java application customization algorithm ))

  • Showing 1 - 17 results of 17
Refine Results
  1. 1
  2. 2
  3. 3

    A modified flower pollination algorithm and carnivorous plant algorithm for solving engineering optimization problem by Ong, Kok Meng

    Published 2021
    “…Flower pollination algorithm (FPA) is a biomimicry optimisation algorithm inspired by natural pollination. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5
  6. 6

    Sequence and sequence-less t-way test suite generation strategy based on the elitist flower pollination algorithm by Mohammed Abdullah, Abdullah Nasser

    Published 2018
    “…Addressing these aforementioned issues and complementing the existing sequence based strategies such as t-SEQ, Sequence Covering Array Generator and Bee Algorithm, this thesis presents a unified strategy based on the new meta-heuristic algorithm, called the Elitist Flower Pollination Algorithm (eFPA). …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8
  9. 9
  10. 10

    Robotic arm system with computer vision for colour object Sorting by Meng, Ong Kok, Pauline, Ong, Soong, Low Ee, Kiong, Sia Chee

    Published 2018
    “…Next, the forward kinematic modelling of the robotic arm using Denavit-Hartenberg algorithm and solving the inverse kinematic of the robotic arm using modified flower pollination algorithm (MFPA) are interpreted. …”
    Get full text
    Get full text
    Article
  11. 11
  12. 12
  13. 13

    Hyper-heuristic strategy for input-output-based interaction testing by Din, Fakhrud, Kamal Zuhairi, Zamli

    Published 2022
    “…New strategies known as t-way strategies (where t expresses interaction strength) have been developed for finding interaction faults. However, existing t-way strategies for input-output-based relationship (IOR) interaction testing mostly adopt greedy algorithms which often generate poor quality test data. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14
  15. 15

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item