Search Results - (( evolution optimization bat algorithm ) OR ( variable create process algorithm ))
Search alternatives:
- evolution optimization »
- process algorithm »
- optimization bat »
- create process »
- bat algorithm »
- variable »
-
1
Multi-Swarm bat algorithm
Published 2023“…In this study a new Bat Algorithm (BA) based on multi-swarm technique called the Multi-Swarm Bat Algorithm (MSBA) is proposed to address the problem of premature convergence phenomenon. …”
Article -
2
Quality of service and energy efficient aware (QEEA) scheduling algorithm for long term evolution (LTE) network / Nurulanis Mohd Yusoff
Published 2017“…Basically, the QEEA is based on the Time Domain (TD) and Frequency Domain (FD) scheduling where it is dependent on the QoS requirements to allocate resources. The proposed algorithm is compared against other scheduling algorithms, namely, the Channel and QoS Aware (CQA), Priority Set Scheduler (PSS), Proportional Fair (PF), Maximum Throughput (MT) and Blind Average Throughput (BAT). …”
Get full text
Get full text
Thesis -
3
To study the multi-objective optimization of EDM using genetic algorithm
Published 2013“…Development of EDM process has resulted in significant improvements in operating techniques, productivity and accuracy, which the result of this machining development has helped variability in EDM process. …”
Get full text
Get full text
Undergraduates Project Papers -
4
Comparing seabed roughness result from QPS fledermaus software, benthic trrain modeler [BTM] and developed model derived FRM slope variability algorithm for hard coral reef detecti...
Published 2018“…In ArcGlS software, DEM data will be process by using terrain roughness model that has been derived by using Slope Variability algorithm. …”
Get full text
Get full text
Thesis -
5
Message based random variable length key encryption algorithm.
Published 2009“…None fixed size key caused avoidance of replaying and other attacks that can happen on fixed sized key algorithms. Conclusion: Random process employed in this block cipher increased confidentiality of the message and dynamic length substitution in proposed algorithm may lead to maximum cryptographic confusion and consequently makes it difficult for cryptanalysis.…”
Get full text
Get full text
Article -
6
Test of Self Por [decoded] trait no. 2 / Syafiq Abdul Samat
Published 2021“…Inspired by some of the generative art made via programming, I was able to create my own algorithmic concept, using these “noises” as factors or variables to affect the creation of the proposed visual. …”
Get full text
Get full text
Book Section -
7
Neutralisation state driven single-agent search strategy for solving constraint satisfaction problem / Saajid Akram Ahmed Abuluaih
Published 2019“…For example, the framework of solving CSP imposes a complete permutation of assignments to all remaining variables in order to derive a valid model. The author argues in this study that the problem can be neutralised and it is not necessary to perform brute-force searching all the time if a search strategy could have guided the process to the level where the values of the remaining variables can be determined implicitly, creating what the author calls Solo-Path of assignments in the problem search tree.…”
Get full text
Get full text
Thesis -
8
Edge detection and contour segmentation for fruit classification in natural environment / Khairul Adilah Ahmad
Published 2018“…Due to the inherent and uncertain variability of the Harumanis features, fuzzy learning algorithm has been designed to classify these fruits similar to the ability of human experts. …”
Get full text
Get full text
Thesis -
9
-
10
Flame Development Study at Variable Swirl Level Flows in a Stratified CNG DI Combustion Engine using Image Processing Technique
Published 2011Get full text
Get full text
Citation Index Journal -
11
Enhancing Harmony Search Metaheuristic Algorithm for Coverage Efficiency, Test Suite Reduction, and Running Time in Combinatorial Interaction Testing
Published 2025“…The Harmony Search (HS) algorithm is a recent metaheuristic that mimics musicians’ improvisation to create pleasant compositions according to aesthetic standards widely used in different areas continuously adjusts solution variables to find the best outcome. …”
Get full text
Get full text
Article -
12
The Determinant Factors for the Issuance of Central Bank Digital Currency (CBDC) in Malaysia using Machine Learning Framework
Published 2024“…The overall CentralBank Digital Currency Project Index (CBDCPI) was selected as a target variable,while two machine learning algorithms, Random Forest and XGBoost were utilized to identify the determining variables. …”
Get full text
Get full text
Get full text
Article -
13
New synchronization protocol for distributed system with TCP extension
Published 2013“…Faulty processes may cause some other active processes to become inactive during the queuing or within the using a critical section time. …”
Get full text
Get full text
Thesis -
14
Passive congregation theory for particle swarm optimization (PSO): An application in reservoir system operation
Published 2023“…Monthly releases are taken as the main objective variables and are essentially control the water deficit of the process. …”
Article -
15
The determinant factors for the issuance of Central Bank Digital Currency (CBDC) in Malaysia using machine learning framework
Published 2024“…The overall Central Bank Digital Currency Project Index (CBDCPI) was selected as a target variable, while two machine learning algorithms, Random Forest and XGBoost were utilized to identify the determining variables. …”
Get full text
Get full text
Get full text
Get full text
Article -
16
Optimization of emulsion polymerization of styrene and methyl methacrylate (MMA)
Published 2013“…Using gPROMS, the system analyzed the data, created models, developed algorithms, manipulated and plotted based on the functions and data. …”
Get full text
Get full text
Undergraduates Project Papers -
17
Development of nonlinear model for plug flow reactor process
Published 2010“…This model used reaction of ethyl acetate and sodium hydroxide to perform saponification for simulating the behavior of a simple Plug Flow Reactor process in a time. The mathematical model based on first principles is developed then, the model equation is solving in MATLAB environment by doing algorithm for this process. …”
Get full text
Get full text
Undergraduates Project Papers -
18
Detection of Denial of Service Attacks against Domain Name System Using Neural Networks
Published 2009“…The pre-processor, processes the collected data statistically and derives the final variable values. …”
Get full text
Get full text
Thesis -
19
Detection and Classification of Moving Objects for an Automated Surveillance System
Published 2006“…Technically, this method estimate the motion area before updates the background by taking a weighted average of non-motion area of the current background altogether with non-motion area of the current frame of the video sequence. This step had created a focus of attention for higher level processing and it helps to decrease computation time considerably. …”
Get full text
Get full text
Thesis -
20
Detection and classification of moving objects for an automated surveillance system
Published 2006“…Technically, this method estimate the motion area before updates the background by taking a weighted average of non-motion area of the current background altogether with non-motion area of the current frame of the video sequence. This step had created a focus of attention for higher level processing and it helps to decrease computation time considerably. …”
Get full text
Get full text
Thesis
