Search Results - (( java implementation phase algorithm ) OR ( using evolution matching algorithm ))

  • Showing 1 - 18 results of 18
Refine Results
  1. 1

    Comparison between Lamarckian Evolution and Baldwin Evolution of neural network by Taha, Imad, Inazy, Qabas

    Published 2006
    “…There are two basic strategies in using hybrid GAs, Lamarckian and Baldwinian evolution. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…All the algorithm for the engine has been developed by using Java script language. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Automatic generation of multi-objective neural game controllers using Pareto-based differential evolution by Chin, Kim On, Jason Teo, Chang, Kee Tong

    Published 2010
    “…For this research, three Evolutionary Algorithm (EA) (Genetic Algorithm (GA), Differential Evolution (DE), and POE) is use to evolve a Feed-Forward Artifitial Neural Networks (FFANN) to playa custom made map in Warcraft III and the outcome is compared amng them. …”
    Get full text
    Get full text
    Research Report
  4. 4

    Optimal route checking using genetic algorithm for UiTM's bus services / Tengku Salman Fathi Tengku Jaafar by Tengku Jaafar, Tengku Salman Fathi

    Published 2006
    “…Although from human logical thinking, the route can be generated easily but the calculation of checking the route whether it is optimal route or not is difficult and will take long time to be implemented. This research study with the development of the Optimal Route Checking Using Genetic Algorithm system should solve this scenario. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Iris Segmentation Analysis using Integro-Differential Operator and Hough Transform in Biometric System by Zainal Abidin, Zaheera, -, M.Manaf, Shibghatullah, Abdul Samad, -, S.H.A.Mohd Yunos, -, S.Anawar, -, Z.Ayop

    Published 2012
    “…Then the image captured is segmented and normalized for encoding process. The matching technique, Hamming Distance, is used to match the iris codes of iris in the database weather it is same with the newly enrolled for verification stage. …”
    Get full text
    Get full text
    Article
  6. 6

    Automated Student Timetable Scheduling System based on Genetic Algorithm by Amirul Azuani, Romlee, Noor Ain, Rosly, Meng, Chuan Haw

    Published 2019
    “…Genetic algorithm works based on natural evolutions that comprises of several iterations. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Iris Segmentation Analysis Using Integro-Differential Operator And Hough Transform In Biometric System by Zainal Abidin, Zaheera, Anawar, Syarulnaziah, Ayop, Zakiah, Manaf, Mazani, Shibghatullah, A.S., Mohd Yunos, S.H.A.

    Published 2012
    “…Iris segmentation is foremost part of iris recognition system.There are four steps in iris recognition: segmentation,normalization,encoding and matching.Here, iris segmentation has been implemented using Hough Transform and IntegroDifferential Operator techniques.The performance of iris recognition system depends on segmentation and normalization technique.Iris recognition systems capture an image from individual eye.Then the image captured is segmented and normalized for encoding process.The matching technique,Hamming Distance,is used to match the iris codes of iris in the database weather it is same with the newly enrolled for verification stage.These processes produce values of average circle pupil,average circle iris,error rate and edge points.The values provide acceptable measures of accuracy False Accept Rate (FAR) or False Reject Rate (FRR).Hough Transform algorithm,provide better performance,at the expense of higher computational complexity.It is used to evolve a contour that can fit to a non-circular iris boundary.However,edge information is required to control the evolution and stopping the contour.The performance of Hough Transform for CASIA database was 80.88% due to the lack of edge information.The GAR value using Hough Transform is 98.9% genuine while 98.6% through Integro-Differential Operator.…”
    Get full text
    Get full text
    Get full text
    Article
  8. 8
  9. 9

    A novel Master–Slave optimization algorithm for generating an optimal release policy in case of reservoir operation by Turgut, Mert Sinan, Turgut, Oguz Emrah, Afan, Haitham Abdulmohsin, El-Shafie, Ahmed

    Published 2019
    “…First, three different optimization algorithms, namely particle swarm optimization, differential evolution, and whale optimization algorithm, have been applied. …”
    Get full text
    Get full text
    Article
  10. 10

    CONTEXT AWARE TRAFFIC SCHEDULING ALGORITHM FOR COMMUNICATION SYSTEM IN POWER DISTRIBUTION NETWORK by NURSHAZLINA SUHAIMY

    Published 2023
    “…The designated algorithm is tested with Multi-Protocol Label Switching (MPLS) protocol using Network Simulator 3 (NS-3) as a simulation platform. …”
    text::Thesis
  11. 11

    Fingerprint frontier: the evolution of biometric security by Khalifa, Othman Omran

    Published 2023
    “…Chapter two provides a detailed lens into the core mechanics, followed by an exploration of the algorithms that drive the matching processes in Chapter Three. …”
    Get full text
    Get full text
    Get full text
    Book
  12. 12

    Analysing ratio-based controllers against motivational game theory in peer-to-peer renewable energy trading by Abdullah Azahari, Abdul Aziz, Mohamad Hanif, Noor Hazrin Hany, Mohamed, Martina Muhaizira

    Published 2024
    “…The first controller uses an algorithm that distributes energy production based on the ratio of energy generated to energy demand, with the aim of minimizing wasted energy. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  13. 13

    A guided hybrid k-means and genetic algorithm models for children handwriting legibility performance assessment / Norzehan Sakamat by Sakamat, Norzehan

    Published 2021
    “…Size was extracted using Extreme Point Detection algorithm and Hit or Miss Transformation method was used to extract the stroke formation pattern. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    A Data Mining-Based Model for Assessing Guangzhou's Higher Vocational Colleges 'New Energy Automobile Majors' Vocational Skills by He, Ling, Hamid, Hashima

    Published 2024
    “…The findings show the positive aspects of using modern data-driven methods to more closely match educational institutions with the constantly evolving needs of the AS. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Evolving fuzzy grammar for crime texts categorization by Mohd Sharef, Nurfadhlina, Martin, Trevor

    Published 2015
    “…In this method, the learning model is built based on a set of selected text fragments which are then transformed into their underlying structure called fuzzy grammars. The fuzzy notion is used because the grammar matching, parsing and derivation involve uncertainty. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18