Search Results - (( evolution computing techniques ) OR ( deviation detection techniques ))

Search alternatives:

Refine Results
  1. 1

    Metric-based code smell detection technique for python software by Leeman, Samaila Ja'afaru

    Published 2018
    “…The first phase involves reviewing the literatures on code smells detection techniques, parser models, and code smells in Python software. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Inventory record analysis using deviation analysis / Muda Wali Abdullah by Abdullah, Muda Wali

    Published 2015
    “…This project is about the analysis of inventory records based on data mining technique which is deviation analysis. Deviation analysis refers to the identifying of anomalies which are different things from normal. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Representation Of Rational Bézier Quadratics Using Genetic Algorithm, Differential Evolution And Particle Swarm Optimization by Yahya, Zainor Ridzuan

    Published 2013
    “…For each proposed soft computing technique, parameter tuning is done as an essential study. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Development of a computer vision-based technique for analysis of hand therapy exercise by Muhammad Zabri, Abu Bakar

    Published 2018
    “…For this purpose, the ROM exercise was developed by using the hand detection and tracking, fingertips detection, skeleton joints detection algorithms and joint angle measurement algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Differential evolution technique of HEPWM for three-phase voltage source inverter by Azziddin, Mohamad Razali, Kamisman, Norazelina, Jurifa, Mat Lazi, Bahari, Norhazilina

    Published 2016
    “…This paper presents the execution of Differential Evolution (DE) algorithm in order to understand the principle operation of Harmonic Elimination Pulse-Width Modulation (HEPWM) switching technique. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Harmonic Elimination Pulse Width Modulation Using Differential Evolution Technique For Three Phase Voltage Source Inverter by Kamisman, Norazelina

    Published 2018
    “…Differential Evolution (DE) has been gaining popularity among researchers as an effective yet simple evolutionary algorithm to solve the optimization problems. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Speed estimation and target detection in forward scattering radar by Raja Abdullah, Raja Syamsul Azmir, A. Rasid, Mohd Fadlee, Ismail, Alyani, Mohamed Sadig, Mutaz Salah, Khalafalla, Mohamed

    Published 2008
    “…This paper presents work on target detection and speed estimation method in one of radar types called Forward Scattering Radar (FSR). …”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Sleep apnea detection using cardioid based grap by Mohd Azam, Siti Nurfarah Ain, Sidek, Khairul Azami, Zainal, Nur Izzati

    Published 2016
    “…Thus, the output of the study suggests the proof-of-concept of our proposed mechanisms to detect heart abnormalities and has the potential to act as an alternative to the current techniques.…”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Cumulative frame differencing for urban vehicle detection by Al-Smadi, M, Abdulrahim, K, Salam, RA

    Published 2024
    “…The tests of the proposed technique achieve robust and accurate vehicle segmentation, which improves detection of slow motion, temporary and long term stopped vehicles, moreover, it enables the real-time capability.…”
    Proceedings Paper
  11. 11
  12. 12
  13. 13
  14. 14

    New Variable Sampling Interval Run Sum Standard Deviation And Run Sum Multivariate Coefficient Of Variation Charts by Lim, Alex Jun Xiong

    Published 2017
    “…In Statistical Process Control (SPC), the control charting technique is an effective method to solve quality issues in manufacturing and service industries. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    HEAT EXCHANGER NETWORK SYNTHESIS AND OPTIMIZATION BY PINCH ANALYSIS AND DIFFERENTIAL EVOLUTION METHOD by NGO , THI PHUONG THUY

    Published 2016
    “…This metadology way uses an algorithm which combines Pinch Design Method and Differential Evolution Method. In this technique, the Heat Exchanger Network synthesis is carried out in three levels. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Modified Statistical Process Control For Short Runs Test And Measurement Process To Reduce False Alarm by Koh, Chin Kok

    Published 2018
    “…Thereafter, Five-band setting and S–factor are proposed to estimate process standard deviation to maximize the the opportunity to detect assignable causes with low false-reject rate. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Feature selection in intrusion detection, state of the art: A review by Rais, H.M., Mehmood, T.

    Published 2016
    “…These systems find the behavior that is deviated from the normal behavior. Network anomaly detection methods are implemented using different approaches including machine learning, data mining, and many more. …”
    Get full text
    Get full text
    Article
  19. 19

    Comparative study between signature-based and anomaly-based network intrusion detection system (SBNIDS and ABNIDS) by Chiadighikaobi, Ikenna Rene

    Published 2015
    “…On the other hand, Anomaly-based detection techniques which is a behaviour techniques, detects the abnormal behaviour in a computer systems and networks. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  20. 20

    Decomposition–based multi-objective differential evolution for extractive multi-document automatic text summarization by Wahab, Muhammad Hafizul Hazmi, Abdul Hamid, Nor Asilah Wati, Subramaniam, Shamala, Latip, Rohaya, Othman, Mohamed

    Published 2024
    “…However, the current approach faces a significant hurdle due to the computational intensity of the process, particularly when employing complex optimization techniques like swarm intelligence optimization alongside a costly ATS repair operator. …”
    Get full text
    Get full text
    Article