Search Results - (( developing operation matching algorithm ) OR ( java optimization method algorithm ))
Search alternatives:
- developing operation »
- java optimization »
- method algorithm »
- matching »
-
1
Route Optimization System
Published 2005“…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
Get full text
Get full text
Final Year Project -
2
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…Enhance hybrid genetic algorithm and particle Swarm optimization are developed to select the optimal device in either fog or cloud. …”
Get full text
Get full text
Article -
3
Fuzzy modeling using Bat Algorithm optimization for classification
Published 2018“…In order to solve it, Bat Algorithm method is implement in to optimization method in fuzzy modeling for classification. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
4
Shape-Based Matching: Application of Defect Detection
Published 2011“…This paper stresses more on the vision algorithm that mainly focus on shape-based matching application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Optimal route checking using genetic algorithm for UiTM's bus services / Tengku Salman Fathi Tengku Jaafar
Published 2006“…This research study with the development of the Optimal Route Checking Using Genetic Algorithm system should solve this scenario. …”
Get full text
Get full text
Thesis -
6
Optimize class time tabling by using genetic algorithm technique in UTHM
Published 2019“…This research used genetic algorithm (GA) that was applied to java programming languages with a goal of reducing conflict and optimizing the fitness. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Sports tournament scheduling using genetic algorithm / Hafeezur Syakir Abdul Motok@Mohd Ridzuan
Published 2020“…The system uses the Rapid Application Development (RAD) methodology in system development and will be operate on a web-based platform. …”
Get full text
Get full text
Thesis -
8
Flexible Approach for Region of Interest Creation for Shape-Based Matching in Vision System
Published 2009“…This paper stress on the vision algorithm used which mainly focus on the shape matching properties of the product. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Implementation of Shape – Based Matching Vision System in Flexible Manufacturing System
Published 2010“…This paper stress on the vision algorithm used which mainly focus on the shape matching properties of the product. …”
Get full text
Get full text
Get full text
Article -
10
Implementation of Shape – Based Matching Vision System in Flexible Manufacturing System
Published 2010“…This paper stress on the vision algorithm used which mainly focus on the shape matching properties of the product. …”
Get full text
Get full text
Get full text
Article -
11
Video surveillance: Item monitoring against theft
Published 2023“…After that, the system will get the current frame to find the common features with the background frame by using a feature matching algorithm. The respective counter for matching will be increased by 1 if the average match calculated is under certain thresholds. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
12
Input-output based relation combinatorial testing using whale optimization algorithm for generating near optimum number of test suite
Published 2025“…This study proposes a combinatorial testing method utilizing the Whale Optimization Algorithm (WOA). …”
Get full text
Get full text
Get full text
Article -
13
Scale-invariant and adaptive-search template matching for monocular visual odometry in low-textured environment
Published 2016“…Therefore, a new technique and algorithm were developed to resolve the image scale uncertainty. …”
Get full text
Get full text
Thesis -
14
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Features selection process can be considered a problem of global combinatorial optimization in machine learning. Genetic algorithm GA had been adopted to perform features selection method; however, this method could not deliver an acceptable detection rate, lower accuracy, and higher false alarm rates. …”
Get full text
Get full text
Thesis -
15
Comparison of performances of Jaya Algorithm and Cuckoo Search algorithm using benchmark functions
Published 2022“…Metaheuristic algorithms have been used successfully for solving different optimization problems. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Employing longest common subsequence method to retrieve translated Al-Quran documents / Muhamad Shamsudin
Published 2001“…Longest Common Subsequence algorithm (LCS) has been developed to solve string matching problems. …”
Get full text
Get full text
Thesis -
17
A study on data-driven impedance matching in four channels bilateral teleoperation
Published 2019“…The main objective of this research is to design and develop control algorithms to drive both sides of the master and slave system to attain symmetrical impedance between them. …”
Get full text
Get full text
Research Report -
18
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…Feature subset selection and classifier ensemble learning are familiar techniques with high ability to optimize above problems. Recently, various techniques based on different algorithms have been developed. …”
Get full text
Get full text
Thesis -
19
Online fingerprint recognition
Published 2010“…For minutiae matching, the matching algorithm has been developed. …”
Get full text
Get full text
Undergraduates Project Papers -
20
Region duplication forgery detection technique based on keypoint matching / Diaa Mohammed Hassan Uliyan
Published 2016“…Most prior block based methods rely on exhaustive block matching on image contents and suffer from their inability to localize this type of forgery when the duplicated regions have gone through some geometric transformation operations and post-processing operations. …”
Get full text
Get full text
Thesis
