Search Results - (( java implementation re algorithm ) OR ( using functional study algorithm ))
Search alternatives:
- java implementation »
- implementation re »
- using functional »
- functional study »
- re algorithm »
-
1
Evolutionary cost-cognizant regression test case prioritization for object-oriented programs
Published 2019“…The recent trend of software development uses OO paradigm. Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
Get full text
Get full text
Thesis -
2
Determining the preprocessing clustering algorithm in radial basis function neural network
Published 2008“…Three types of method used in this study to find the centres include random selections, K-means clustering algorithm and also K-median clustering algorithm. …”
Get full text
Get full text
Article -
3
A block cipher based on genetic algorithm
Published 2016“…In many algorithms which are based on the genetic algorithm approach, diffusion properties using crossover and mutation function are being generated to produce a secure data transmission. …”
Get full text
Get full text
Get full text
Thesis -
4
A modified flower pollination algorithm and carnivorous plant algorithm for solving engineering optimization problem
Published 2021“…In this study, two metaheuristic algorithms, namely, modified flower pollination algorithm (MFPA) and carnivorous plant algorithm (CPA), were proposed. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
A study on regional GDP forecasting analysis based on radial basis function neural network with genetic algorithm (RBFNN-GA) for Shandong economy
Published 2022“…This study uses the genetic algorithm radial basis, neural network model, to make judgments on the relationships contained in this sequence and compare and analyze the prediction effect and generalization ability of the model to verify the applicability of the genetic algorithm radial basis, neural network model, based on the modeling of historical data, which may contain linear and nonlinear relationships by itself, so this study uses the genetic algorithm radial basis, neural network model, to make, compare, and analyze judgments on the relationships contained in this sequence.…”
Get full text
Get full text
Article -
6
Comparative implementation of the benchmark Dejong 5 function using flower pollination algorithm and the African buffalo optimization
Published 2019“…In addition, it explores the Dejong 5 function with the hope of attracting the attention of the research community to evaluate the capacity of the two comparative algorithms as well as the Dejong 5 function. …”
Get full text
Get full text
Get full text
Article -
7
Optimization of mycelium growth using genetic algorithm for multi-objective functions
Published 2019“…To solve this issues, multi-objective genetic algorithm was chosen as the methodology for this project, specifically using NSGA-ii algorithm. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
8
Fuzzy modeling using Bat Algorithm optimization for classification
Published 2018“…The study of Bat Algorithm is achieved the purpose of this research. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
9
Optimization Of Pid Controller Using Grey Wolf Optimzer And Dragonfly Algorithm
Published 2018“…In this research, swarming intelligence is used to solve optimisation problem. Grey Wolf Optimizer and Dragonfly Algorithm were chosen. …”
Get full text
Get full text
Monograph -
10
Genetic Algorithms In Optimizing Membership Function For Fuzzy Logic Controller
Published 2010“…This study investigates the use of Genetic Algorithms (GA) to design and implement of Fuzzy Logic Controllers (FLC). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
An improved fast scanning algorithm based on distance measure and threshold function in region image segmentation
Published 2016“…Such an approach leads to a weak reliability and shape matching of the produced segments. Hence, this study proposes an Improved Fast Scanning algorithm that is based on Sorensen distance measure and adaptive threshold function. …”
Get full text
Get full text
Get full text
Thesis -
12
-
13
Effect of fitness function on localization performance in range-free localization algorithm
Published 2024“…However, so far there is no literature to investigate the effect of fitness function on rang-free localization algorithm. Firstly, this study comprehensively reviews and classifies the frequently-used localization fitness function in range-free localization scheme. …”
Get full text
Get full text
Get full text
Get full text
Article -
14
Curve Reconstruction By Metaheuristics Algorithms On Cubic Rational Bézier Function
Published 2019“…Various of curve fitting studies had been done by many researchers specifically using optimisation technique. …”
Get full text
Get full text
Thesis -
15
-
16
The tuning of error signal for back-propagation algorithms
Published 2008“…This new algorithm is proven to be a better algorithm. The main purpose of this study is to evaluate the efficiency of improved two-term error function by applying three different values of ß parameter in the activation function. …”
Get full text
Get full text
Get full text
Thesis -
17
A Preliminary Study on Camera Auto Calibration Problem Using Bat Algorithm
Published 2013“…The cost function used in this paper is based on the Kruppa’s equation. …”
Get full text
Get full text
Conference or Workshop Item -
18
-
19
A Reference Based Surface Defect Segmentation Algorithm For Automatic Optical Inspection System
Published 2020“…Then, the histogram distance function for each location is computed using a pseudo-probability combination of novel histogram distance functions on a clustered histogram. …”
Get full text
Get full text
Thesis -
20
A study on one way hashing function and its application for FTMSK webmail / Mohd Rosli Mohd Daud
Published 2007“…The research are aim to study on Message Digests version 5 (MD5) and Secure Hash Algorithm version 1 (SHA1) with the use for password in email account. …”
Get full text
Get full text
Research Reports
