Search Results - (( developing function mead algorithm ) OR ( java evaluation case algorithm ))
Search alternatives:
- developing function »
- java evaluation »
- evaluation case »
- mead algorithm »
- case algorithm »
- function mead »
-
1
Comparison of performances of Jaya Algorithm and Cuckoo Search algorithm using benchmark functions
Published 2022“…To help engineers select the best metaheuristic algorithms for their problems, there is a need to evaluate the performance of different metaheuristic algorithms against each other using common case studies. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
2
An enhancement of multi-factor weighted approach technique in prioritizing test cases by comparing similarity distance
Published 2025“…Software testing is one of the most critical phases in the software development life cycle model (SDLC), where the quality of a software product is evaluated. Test case prioritization (TCP) is used to prioritize and schedule test case execution to conduct higher-priority test cases to optimize the software testing process. …”
Get full text
Get full text
Get full text
Article -
3
A framework of test case prioritisation in regression testing using particle swarm-artificial bee colony algorithm
Published 2024“…This research employed a modified version of the Design Science Research Methodology (DSRM), streamlined into five stages: problem identification, theoretical study, framework development, evaluation, and reporting. The developed framework, grounded in fault-based testing theory, comprises three key components: inputs, prioritization factors, and a prioritization algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
4
Simulation of COVID-19 outbreaks via graphical user interface (GUI)
Published 2021“…An improved SIRD model was solved via the 4th order Runge-Kutta (RK4) method and 14 unknown parameters were estimated by using Nelder- Mead algorithm and pattern-search technique. The publicly available data for COVID-19 outbreak in Malaysia was used to validate the performance of the model. …”
Get full text
Get full text
Get full text
Article -
5
Modelling transmission dynamics of Covid-19 during pre-vaccination period in Malaysia: a GUI-based seird predictive model using Streamlit
Published 2024“…The mathematical model is solved using the Scipy odeint function, which uses the Livermore Solver for Ordinary Differential Equations with an Automatic method switching (LSODA) algorithm. …”
Get full text
Get full text
Get full text
Article -
6
Modelling transmission dynamics of covid-19 during Pre-vaccination period in Malaysia: a predictive guiseird model using streamlit
Published 2023“…The mathematical model is solved using Scipy odeint function, which uses Livermore Solver for Ordinary Differential Equations with an Automatic method switching (LSODA) algorithm. …”
Get full text
Get full text
Proceeding Paper -
7
Modelling transmission dynamics of Covid-19 during pre-vaccination period in Malaysia : a gui-based seird predictive model using streamlit
Published 2024“…The mathematical model is solved using the Scipy odeint function, which uses the Livermore Solver for Ordinary Differential Equations with an Automatic method switching (LSODA) algorithm. …”
Get full text
Get full text
Get full text
Article -
8
Mathematical model for predicting the performance of photovoltaic system with delayed solar irradiance
Published 2023“…The numerical solution is obtained by adopting the Runge Kutta method coupled with a parameter fitting technique, the Nelder Mead algorithm, which is implemented by using MATLAB software. …”
Get full text
Get full text
Thesis -
9
Mathematical model for predicting the performance of photovoltaic system with delayed solar irradiance
Published 2024“…The numerical solution is obtained by adopting the 4th-order Runge Kutta method coupled with a parameter fitting technique, the Nelder Mead algorithm, which is implemented by using MATLAB software. …”
Get full text
Get full text
Get full text
Article -
10
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…Third approach is transforming identifiers to junk code to hide the meaning and increase the complexity of the code. Empirical evaluation was conducted to evaluate the proposed Hybrid Obfuscation Technique. …”
Get full text
Get full text
Thesis -
11
Landslide Susceptibility Mapping with Stacking Ensemble Machine Learning
Published 2024“…The landslide data together with its conditioning factors (feature variables) collected from three districts in the Central Java Province, Indonesia, has been used as the case study for the LSM. …”
Conference Paper -
12
Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee
Published 2012“…Case studies were conducted to evaluate the capability of the proposed methods in mitigating shoulder-surfing attack. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
13
Evolutionary cost-cognizant regression test case prioritization for object-oriented programs
Published 2019“…Afterward evolutionary algorithm (EA) was employed to prioritize test cases based on the rate severity of fault detection per unit test cost. …”
Get full text
Get full text
Thesis
