Search Results - (( evolution optimisation based algorithm ) OR ( spatial visualization new algorithm ))
Search alternatives:
- evolution optimisation »
- spatial visualization »
- optimisation based »
- visualization new »
- new algorithm »
-
1
-
2
Performance evaluation and benchmarking of an extended computational model of ant colony system for DNA sequence design
Published 2014“…Ant colony system (ACS) algorithm is one of the biologically inspired algorithms that have been introduced to effectively solve a variety of combinatorial optimisation problems. …”
Get full text
Get full text
Get full text
Article -
3
A competitive co-evolutionary approach for the nurse scheduling problem
Published 2026“…The competitive approach further exhibits smoother convergence behaviour across generations, indicating stronger optimisation dynamics and improved robustness. These findings demonstrate that competitive co-evolution provides an effective and practical alternative to static fitness-based evolutionary methods for nurse scheduling, with broader applicability to healthcare scheduling and constraint optimisation problems.…”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
4
A hyper-heuristic based strategy for image segmentation using multilevel thresholding
Published 2025“…EMCQ uses four low-level heuristic sets adopted from the teaching learning-based optimisation (TLBO) algorithm, flower pollination algorithm (FPA), genetic algorithm (GA), and Jaya algorithm. …”
Get full text
Get full text
Get full text
Article -
5
A hyper-heuristic based strategy for image segmentation using multilevel thresholding
Published 2025“…EMCQ uses four low-level heuristic sets adopted from the teaching learning-based optimisation (TLBO) algorithm, flower pollination algorithm (FPA), genetic algorithm (GA), and Jaya algorithm. …”
Get full text
Get full text
Get full text
Article -
6
Stock market turning points rule-based prediction / Lersak Photong … [et al.]
Published 2021“…Finally, rule-based optimisation techniques such as Particle Swarm Optimization (PSO), Differential Evolution (DE) and Grey Wolf Optimizer (GWO) were used to minimise the amount of time employed in the stock market turning points prediction. …”
Get full text
Get full text
Book Section -
7
Video quality assessment method: MD-SSIM
Published 2015Get full text
Get full text
Get full text
Proceeding -
8
B-spline curve fitting with different parameterization methods
Published 2020“…After generating control points, distance between the generated and original data points is used to identify the error of the algorithm. Later, genetic algorithm and differential evolution optimization are used to optimise the error of the curve. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
9
Reliability assessment of power system generation adequacy with wind power using population-based intelligent search methods
Published 2017“…This study sought to examine the performance of three newly proposed techniques, for reliability assessment of the power systems, namely Disparity Evolution Genetic Algorithm (DEGA), Binary Particle Swarm Optimisation (BPSO), and Differential Evolution Optimization Algorithm (DEOA). …”
Get full text
Get full text
Get full text
Thesis -
10
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
11
Rain streaks removal using total variation and sparse coding based on case based reasoning approach
Published 2024journal::journal article -
12
DCT domain stegasvm-shifted LSB model for highly imperceptible and robust cover-image
Published 2015“…The importance of information security in protecting and hiding information has increased due to the increased use of computers and Internet.Information hiding technology such as Digital Image steganography embeds secret messages inside other files.Least Square Bit (LSB) is the most popular technique used in image steganography that hides data behind a cover-image in a spatial and discrete cosine transform (DCT) domain.Support Vector Machine (SVM) is another technique that is used to strengthen the embedding algorithm.The main aim of image steganography is to keep the secret-message remain secret regardless of the techniques used.But many of the previously proposed techniques failed to attain this aim.The main concerns to this problem are the non-random changes of a cover-image that constantly occurred after the embedding process and the non-robustness of the embedding algorithm to image processing operation.This study therefore proposes a new model that utilises Human Visual System (HVS) and embedding technique through shifted LSB called StegaSVM-Shifted LSB in DCT domain to preserve the imperseptibility and increase the robustness of stego-images.The proposed technique shows better performances compared to other existing techniques.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
iBUST: An intelligent behavioural trust model for securing industrial cyber-physical systems
Published 2024“…In addition, a new optimisation model for finding optimum parameter values in the MEDF and an algorithm for transmuting a 1D quantitative feature into a respective categorical feature are developed to facilitate the model. …”
Get full text
Get full text
Get full text
Article -
14
Effective salience-based fusion model for image retrieval
Published 2016“…This new model collects visual words based on their importance and combines several Pyramidal Histogram of visual Words (PHOW) feature vectors from the salient, rectangular part of a picture, as well as from the whole picture, to overcome the above-mentioned problem. …”
Get full text
Get full text
Get full text
Thesis -
15
Content-based indexing of low resolution documents
Published 2016“…We develop CBIR system and conduct various retrieval experiments with the fundamental aim of comparing the accuracy during image retrieval. A new algorithm that can be used with integrated visual signatures, especially in late fusion query was introduced. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
16
A novel approach to human motion estimation with applications in human-robot safety
Published 2008“…Supplying knowledge from the presented model of spatial cognition and path planning to mobile robots can enhance their motion algorithms for better obstacle avoidance as well as safer service to users with visual impairment and blindness.…”
Get full text
Get full text
Get full text
Article -
17
MMS : mobile monitoring system using electrical capacitance tomography (ECT)
Published 2008“…The reconstruction image process in the PC was written using programming platform Visual Basic 6.0. The information obtained in the PC can be reconstructed using linear back projection algorithm. …”
Get full text
Get full text
Monograph -
18
A self‐configured link adaptation for green LTE downlink transmission
Published 2015“…Current and next‐generation cellular networks require such interactive techniques in order to be self‐optimised without complex modifications.…”
Get full text
Get full text
Article -
19
Computed tomography and echocardiography image fusion technique for cardiac images
Published 2016“…Then, a segmentation approach based on a constrained Level set method is developed to identify the feature from Echocardiography images. It is a new geometrically level Set algorithm for the segmentation of the endocardial contours in echocardiographic images in presence of intensity non-uniformity. …”
Get full text
Get full text
Get full text
Thesis -
20
Unsupervised monocular depth estimation with multi-scale structural similarity powered loss function / Ali Kohan
Published 2020“…Depth Estimation refers to a set of techniques and algorithms that aim to obtain a representation of spatial information of a scene. …”
Get full text
Get full text
Get full text
Thesis
