Search Results - (( parameter evaluation case algorithm ) OR ( variable extractions method algorithm ))
Search alternatives:
- parameter evaluation »
- extractions method »
- method algorithm »
- evaluation case »
- case algorithm »
- variable »
-
1
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…Many programming languages are used for programming; Java programming language is known to be most common due to its features, the use of this popular language increases an attacker's ability to steal intellectual property (IP), as the source program is translated to an intermediate format retaining most of the information such as meaningful variables names present in source code. An attacker can easily reconstruct source code from such intermediate formats to extract sensitive information such as proprietary algorithms present in the software. …”
Get full text
Get full text
Thesis -
2
T-way testing : a test case generator based on melody search algorithm
Published 2015“…Next, TTT-MS will be executed through main algorithms to generate Parameters Interaction List, Parameter Values Interaction List, and finally generate final Test Cases based on Melody Search Algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
3
Hybrid Artificial Bees Colony Algorithms For Optimizing Carbon Nanotubes Characteristics
Published 2018“…Chemical Vapor Deposition (CVD) is the most efficient method for CNTs production.However,using CVD method encounters crucial issues such as customization,time and cost.Therefore,Response Surface Methodology (RSM) is proposed for modeling and the ABC-βHC is proposed for optimization purpose to address such issues.The selected CNTs characteristics are CNTs yield and quality represented by the ratio of the relative intensity of the D and G-bands (ID/IG).Six case studies are generated from collected dataset including four cases of CNTs yield and one case of ID/IG as single objective optimization problems,while the sixth case represents multi-objective problem.The input parameters of each case are a subset from the set of input parameters including reaction temperature,duration,carbon dioxide flow rate,methane partial pressure,catalyst loading,polymer weight and catalyst weight.The models for the first three case studies were mentioned in the original work.RSM is proposed to develop polynomial models for the output responses in the other three cases and to identi significant process parameters and interactions that could affect the CNTs output responses.The developed models are validated using t-test,correlation and pattern matching.The predictive results have a good agreement with the actual experimental data.The models are used as objective functions in optimization techniques.For multi-objective optimization,this study proposes Desirability Function Approach (DFA) to be integrated with other proposed algorithms to form hybrid techniques namely RSM-DFA,ABC-DFA and ABC-βHC-DFA.The proposed algorithms and other selected well-known algorithms are evaluated and compared on their CNTs yield and quality.The optimization results reveal that ABC-βHC and ABC-βHC-DFA obtained significant results in terms of success rate,required time,iterations,and function evaluations number compared to other well-known algorithms.Significantly,the optimization results from this study are better than the results from the original work of the collected dataset.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
4
Evaluation and Comparative Analysis of Feature Extraction Methods on Image Data to increase the Accuracy of Classification Algorithms
Published 2024“…The feature extraction methods evaluated were Grayscale Pixel Values, Mean Pixel Value of Channels, and Extracting Edge Features. …”
Get full text
Get full text
Get full text
Get full text
Article -
5
Hyperdize Jaya Algorithm for Harmony Search Algorithm's Parameters Selection
Published 2016“…This paper present a successful method to tune the parameters of the harmony search algorithm, which is a well-known meta-heuristic algorithm. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Coronary artery stenosis detection and visualization / Tang Sze Ling
Published 2015“…The proposed method benchmarked with the state-of-the-art methods and achieved comparable results. …”
Get full text
Get full text
Thesis -
7
A Preliminary Study on Camera Auto Calibration Problem Using Bat Algorithm
Published 2013“…This paper attempts to implement a stochastic optimization algorithm called Bat Algorithm in order to find optimal values of the intrinsic parameters. …”
Get full text
Get full text
Conference or Workshop Item -
8
A study on the parameter selection of bat algorithm in in optimizing parameters in camera auto calibration problem
Published 2022“…By studying the echolocation behavior of the microbats, the bats will try to improve the fitness with each iteration. The Bat Algorithm's performance is evaluated using a case study from a database from Le2i Universite de Bourgoune. …”
Get full text
Get full text
Get full text
Article -
9
-
10
Optimizing timber transportation planning for timber harvesting using bees algorithm in Malaysia
Published 2023“…A Bees Algorithm (BA) was proposed to find an optimum TTP for timber extraction, forest road, and landing locations with grid cell-sized 10 m × 10 m and attributed with fixed and variable costs. …”
Get full text
Get full text
Article -
11
Multi road marking detection system for autonomous car using hybrid- based method
Published 2018“…Wu dataset that consist of 1208 road images, which were extracted from videos recorded around California, the proposed algorithm performed satisfactorily. …”
Get full text
Get full text
Get full text
Thesis -
12
Using algorithmic taxonomy to evaluate lecture workload: a case study of services application prototype in the UPM KM Portal
Published 2006Get full text
Get full text
Conference or Workshop Item -
13
Identification of non-linear dynamic systems using fuzzy system with constrained membership functions
Published 2004“…It was found that, in most cases, the CFS performs better than the SFS with similar number of adjustable parameters. …”
Get full text
Get full text
Get full text
Thesis -
14
Using algorithmic taxonomy to evaluate lecture workload: A case study of services application prototype in the UPM KM portal
Published 2006Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Kalman filter based impedance parameter estimation for transmission line and distribution line
Published 2019“…Therefore, a detailed study on developing and evaluating the new algorithms for transmission line parameter estimation is considered in this thesis. …”
Get full text
Get full text
Thesis -
16
-
17
An Improved Hybrid of Particle Swarm Optimization and the Gravitational Search Algorithm to Produce a Kinetic Parameter Estimation of Aspartate Biochemical Pathways
Published 2017“…However, measuring these parameters is typically difficult and even impossible in some cases. …”
Get full text
Get full text
Get full text
Article -
18
Parameter estimation of cocomo model using the jaya algorithm for software cost estimation
Published 2019“…The Constructive Cost Model (COCOMO) is a procedural software cost estimation model developed by Barry W. Boehm. In this case, the estimation of value of the COCOMO model parameters are determined for the cost and time estimation of the COCOMO model. …”
Get full text
Get full text
Undergraduates Project Papers -
19
Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak
Published 2019“…The fourth stage is to design evaluation methodology of Max-Min Rule-Based Classification Algorithm using classifier model. …”
Get full text
Get full text
Thesis -
20
Backstepping Integral Super Twisting Sliding Mode Control Algorithm For Autonomous Underwater Glider
Published 2019“…The BISTSMC was tested for external disturbance and parameter variations. The BISTSMC has been benchmarked its performances with other sliding mode control (SMC) strategies to evaluate the chattering suppression of the controllers. …”
Get full text
Get full text
Thesis
