Search Results - (( peer evaluation method algorithm ) OR ( variable generation using algorithm ))

Refine Results
  1. 1

    A firefly algorithm based hybrid method for structural topology optimization by Gebremedhen, H.S., Woldemichael, D.E., Hashim, F.M.

    Published 2020
    “…The lower and upper limit of design variables (0 and 1) were used to find initial material distribution to initialize the firefly algorithm based section of the hybrid algorithm. …”
    Get full text
    Get full text
    Article
  2. 2

    Efficient genetic partitioning-around-medoid algorithm for clustering by Garib, Sarmad Makki Mohammed

    Published 2019
    “…It uses the compact and unique variable K length real encoding. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Bayesian logistic regression model on risk factors of type 2 diabetes mellitus by Chiaka, Emenyonu Sandra

    Published 2016
    “…Logistic regression model has long been known and it is commonly used in analysing a binary outcome or dependent variable and connects the binary dependent variable to several independent variables. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Optimizing decentralized exam timetabling with a discrete whale optimization algorithm by Emily Sing Kiang Siew, San nah sze, Say leng goh

    Published 2025
    “…The proposed method begins by generating an initial solution using a constructive heuristic. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Optimizing Decentralized Exam Timetabling with a Discrete Whale Optimization Algorithm by Emily Siew, Sing Kiang, Sze, San Nah, Goh, Say Leng

    Published 2025
    “…The proposed method begins by generating an initial solution using a constructive heuristic. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Novel techniques for enhancement and segmentation of acne vulgaris lesions by Malik, A. S., Humayun, J., Kamel, N., Yap, F. B.-B.

    Published 2013
    “…The proposed algorithm uses local rank transform to generate the HDR images from a single acne image followed by the log transformation. …”
    Get full text
    Get full text
    Get full text
    Citation Index Journal
  7. 7

    Extremal region detection and selection with fuzzy encoding for food recognition by Razali @ Ghazali, Mohd Norhisham

    Published 2019
    “…The first algorithm locates interest points in food images using an MSER. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Fuzzy logic-based hill climbing technique for photovoltaic maximum power point tracking converter by Taghvaee, Mohammad Hossein

    Published 2013
    “…Its weaknesses, however, are its variable generation and non-linear characteristic due to its intermittent nature. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    An evolutionary based features construction methods for data summarization approach by Rayner Alfred, Suraya Alias, Chin, Kim On

    Published 2015
    “…Here, feature construction methods are applied in order to improve the descriptive accuracy of the DARA algorithm.This research proposes novel feature construction methods, called Variable Length Feature Construction without Substitution (VLFCWOS) and Variable Length Feature Construction with Substitution(VLFCWS), in order to construct a set of relevant features in learning relational data. …”
    Get full text
    Get full text
    Research Report
  11. 11

    Slight-Delay Shaped Variable Bit Rate (SD-SVBR) Technique for Video Transmission by Ahmad Suki, Che Mohamed Arif

    Published 2011
    “…SVBR faces several problems, such as the occurrence of unwanted sharp decrease in data rate, buffer overflow, the existence of a low data rate, and the generation of a cyclical negative fluctuation. The new algorithm is capable of producing a high data rate and at the same time a better quantization parameter (QP) stability video sequence. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    MotionSure: a cloud-based algorithm for detection of injected object in data in motion by Islam, Thouhedul, Olanrewaju, Rashidah Funke, Khalifa, Othman Omran

    Published 2017
    “…Two encryption functions in PHP has been used for detecting injected object; bcrypt methods in Laravel and MD5 that generate 32 random keys. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  13. 13

    Damage visualization based on frequency shift of single-mode ultrasound-guided wavefield by Shahrim, Muhamad Azim, Harmin, Mohammad Yazdi, Romli, Fairuz Izzuddin, Chia, Chen Ciang, Jung-Ryul, Lee

    Published 2022
    “…Last but not least, the comparison of accuracy between frequency analysis algorithm and variable time window amplitude mapping (VTWAM) algorithm is performed. …”
    Get full text
    Get full text
    Article
  14. 14

    A Hybrid of Optimization Method for Multi-Objective Constraint Optimization of Biochemical System Production by Mohd Arfian, Ismail, Safaai, Deris, Mohd Saberi, Mohamad, Mohd Adham, Isa, Afnizanfaizal, Abdullah, Muhammad Akmal, Remli, Mohi-Aldeen, Shayma Mustafa

    Published 2015
    “…The proposed method starts with Newton method by treating the biochemical system as a non-linear equations system. Then, Genetic Algorithm (GA) in SPEA and CCA were used to represent the variables in non-linear equations system into multiple sub-chromosomes. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Optimal planning of photovoltaic distributed generation considering uncertainties using monte carlo pdf embedded MVMO-SH by Norhafidzah, Mohd Saad

    Published 2021
    “…The load flow patterns will significantly have affected when uncertain PV generation – load models are considered into the power flow algorithm. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Variable Neighborhood Descent and Whale Optimization Algorithm for Examination Timetabling Problems at Universiti Malaysia Sarawak by Emily Sing Kiang, Siew

    Published 2025
    “…A constructive algorithm was developed to generate an initial feasible solution, which was subsequently refined using two primary approaches to evaluate their efficiency: Iterative Threshold Pipe Variable Neighborhood Descent (IT-PVND), and a modified Whale Optimization Algorithm (WOA). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Evaluation of lightning return stroke current using measured electromagnetic fields by Mahdi, Izadi

    Published 2012
    “…This research proposed an inverse procedure algorithm using the proposed general fields’ expressions and the particle swarm optimization algorithm (PSO) in the time domain where the full channel base current wave shape in time domain can be determined. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Improvement on rooftop classification of worldview-3 imagery using object-based image analysis by Norman, Masayu

    Published 2019
    “…The accuracy of each algorithm was evaluated using LibSVM, Bayes network, and Adaboost classifier. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Crossover and mutation operators of real coded genetic algorithms for global optimization problems by Lim, Siew Mooi

    Published 2016
    “…The rationale behind developing algorithms using real encoding of chromosome representations is the limitations of binary encoding. …”
    Get full text
    Get full text
    Thesis
  20. 20