Search Results - (( developing formative perceptions algorithm ) OR ( java optimization strategy algorithm ))
Search alternatives:
- formative perceptions »
- perceptions algorithm »
- developing formative »
- strategy algorithm »
- java optimization »
-
1
Input-output based relation combinatorial testing using whale optimization algorithm for generating near optimum number of test suite
Published 2025“…This study proposes a combinatorial testing method utilizing the Whale Optimization Algorithm (WOA). The study compares the performance of WOA with various existing strategies, such as Greedy, Density, TVG, Union, ParaOrder, ReqOrder, ITTDG, AURA, Java Algorithm (CTJ), TTSGA, and AFA. …”
Get full text
Get full text
Get full text
Article -
2
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. …”
Review -
3
Comparison of performances of Jaya Algorithm and Cuckoo Search algorithm using benchmark functions
Published 2022“…Metaheuristic algorithms have been used successfully for solving different optimization problems. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
SG-PBFS : Shortest Gap-Priority Based Fair Scheduling technique for job scheduling in cloud environment
Published 2024“…Firstly, a Priority-Based Fair Scheduling (PBFS) algorithm has been introduced to schedule jobs so that jobs can access the required resources at optimal times. …”
Get full text
Get full text
Get full text
Get full text
Article -
5
Automatic image annotation using color segmentation / Siti 'Aisyah Sa'dan
Published 2009“…The scope of this project is digital image of beach photographs with JPegs format. This project is implemented using a basic KMeans clustering as the algorithm for color segmentation and using direct technique to annotate the colors with the appropriate words by using predefined colors.…”
Get full text
Get full text
Thesis -
6
Interactive learning package for artificial neural network (Demonstration Module) / Camellia Mohd Kamal
Published 2004“…For the Feed Forward, Recurrent and Self Organizing Map Networks there are the Neuron Model, Basic Architecture and Training Algorithm. The demonstrations are included each every topic. …”
Get full text
Get full text
Thesis -
7
Deep reinforcement learning-based driving strategy for avoidance of chain collisions and its safety efficiency analysis in autonomous vehicles
Published 2022“…A perception network structure based on formation and on actor-critic methodologies is employed to enhance the decision-making process. …”
Get full text
Get full text
Get full text
Article -
8
Deep reinforcement learning based driving strategy for avoidance of chain collisions and its safety efficiency analysis in autonomous vehicles
Published 2022“…A perception network structure based on formation and on actor-critic methodologies is employed to enhance the decision-making process. …”
Get full text
Get full text
Get full text
Article -
9
Evolutionary cost-cognizant regression test case prioritization for object-oriented programs
Published 2019“…There is also a need to consider implementing this strategy for dynamic object-oriented languages such as Python, Lisp, and Smalltalk.…”
Get full text
Get full text
Thesis -
10
Cooperative heterogeneous vehicular clustering for road traffic management / Iftikhar Ahmad
Published 2019“…Furthermore, a self-location calculation algorithm is developed to enable vehicles to calculate their location in the absence of global positioning system (GPS) signals. …”
Get full text
Get full text
Get full text
Thesis -
11
Zero distortion-based steganography for handwritten signature
Published 2018“…This means that any changes on the cover media (c) could lead to the identification of the stego media (s), which contains the secret message (m). Thus, developing a steganographic algorithm to use cover media (c) without raising attention is the most challenging task in data hiding. …”
Get full text
Get full text
Get full text
Thesis
