Search Results - (( processes evaluation function algorithm ) OR ( java application matching algorithm ))

Refine Results
  1. 1
  2. 2

    An improved fast scanning algorithm based on distance measure and threshold function in region image segmentation by Ismael, Ahmed Naser

    Published 2016
    “…Hence, this study proposes an Improved Fast Scanning algorithm that is based on Sorensen distance measure and adaptive threshold function. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Fuzzy modeling using Bat Algorithm optimization for classification by Noor Amidah, Ahmad Sultan

    Published 2018
    “…Fuzzy modeling is a process of generating parameters which are fuzzy rule and membership function. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  5. 5
  6. 6

    Performance of Multi-Layer Perceptron Neural Networks with an Exponential Decay Activation Function in Airwaves Estimation by Muhammad , Abdulkarim, Wan Ahmad, Wan Fatimah, Shafie, Afza, Razali, Radzuan

    Published 2013
    “…The benchmark for the performance evaluation is by comparing the exponential decay activation function with log-sigmoid and tan-sigmoid activation functions through back propagation algorithm. …”
    Get full text
    Get full text
    Citation Index Journal
  7. 7
  8. 8
  9. 9

    A novel explanatory hybrid artificial bee colony algorithm for numerical function optimization by Jarrah, Muath Ibrahim, Mohamad Jaya, Abdul Syukor, Mohd Abid, Mohd Asyadi Azam, Alqattan, Zakaria N., Azam, Mohd Asyadi, Abdullah, Rosni, Jarrah, Hazim, Abu‑Khadrah, Ahmed Ismail

    Published 2020
    “…The aim is to improve the exploitation mechanism of the standard ABC. The proposed algorithm was experimentally tested with parameters tuning process and validated using selected benchmark functions with diferent characteristics, and it was also evaluated and compared with well-known state-of-the-art algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Levy tunicate swarm algorithm for solving numerical and real-world optimization problems by J. J., Jui, M. A., Ahmad, M. I. M., Rashid

    Published 2022
    “…The proposed LTSA algorithm performance was evaluated using 23 well-known benchmark test functions, namely unimodal benchmark functions, multimodal benchmark functions, and fixed-dimension multimodal benchmark functions, as well as compared with the traditional TSA. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11
  12. 12

    Biological-based semi-supervised clustering algorithm to improve gene function prediction by Kasim, Shahreen, Deris, Safaai, M. Othman, Razib, Hashim, Rathiah

    Published 2011
    “…However, commonclustering algorithms do not provide a comprehensive approach that look into the three categories of annotations; biologicalprocess, molecular function, and cellular component, and were not tested with different functional annotation database formats.Furthermore, the traditional clustering algorithms use random initialization which causes inconsistent cluster generation and areunable to determine the number of clusters involved. …”
    Get full text
    Get full text
    Article
  13. 13

    Levy slime mould algorithm for solving numerical and engineering optimization problems by J. J., Jui, M. A., Ahmad, M. I. M., Rashid

    Published 2022
    “…We took advantage of the Levy flight, which solved the local optima problem and improved traditional SMA efficiency. The proposed LSMA algorithm performance was evaluated using 23 well-known benchmark test functions, namely unimodal benchmark functions, multimodal benchmark functions, and fixed-dimension multimodal benchmark functions, as well as compared with the traditional SMA. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14
  15. 15

    Securing cloud data system (SCDS) for key exposure using AES algorithm by Thabet Albatol, Mohammed Samer Hasan

    Published 2021
    “…The AES algorithm has its own structure to encrypt and decrypt sensitive data that make the attackers difficult to get the real data when encrypting by AES algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Solving computational algorithm using CLONALNet technique based on artificial clonal selection by Samy J.A.L.A., Krishnan P.S.A.L., Kiong T.S.

    Published 2023
    “…By using this algorithm the steps to obtain the fitness function is optimized and processing time is reduced. …”
    Conference paper
  17. 17

    Development and applications of metaheuristic algorithms in engineering design and structural optimization / Ali Sadollah by Ali, Sadollah

    Published 2013
    “…The efficiency of the proposed optimizers was evaluated using numerous well-known unconstrained and constrained benchmark functions which have been widely used in literature. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Simulated Kalman Filter algorithms for solving optimization problems by Nor Hidayati, Abdul Aziz

    Published 2019
    “…The algorithms are evaluated using 30 benchmark functions of the CEC2014 benchmark suite, and then applied to solve PCB drill path optimization case study. …”
    Get full text
    Get full text
    Thesis
  20. 20

    A block cipher based on genetic algorithm by Zakaria, Nur Hafiza

    Published 2016
    “…The structure of the components has a fixed block size which is 128 bits and a key size of 128 bits. There are three functions for each encryption process which are substitution function, crossover and mutation function and add round key function. …”
    Get full text
    Get full text
    Get full text
    Thesis