Search Results - (( software innovation method algorithm ) OR ( using optimization method algorithm ))
Search alternatives:
-
1
Autoreclosure in extra high voltage lines using taguchi's method and optimized neural networks
Published 2008“…The fault identification prior to reclosing is based on optimized artificial neural network associated with standard Error Back-Propagation, Levenberg Marquardt Algorithm and Resilient Back-Propagation training algorithms together with Taguchi's Method. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
2
Software testing optimization for large systems using agent-based and NSGA-II algorithms
Published 2023“…Consequently, a multi-objective optimization technique can be used to optimize the large system testing process. …”
Get full text
Get full text
Get full text
Article -
3
Metaheuristic optimization techniques for localization in outdoor wireless sensor networks: a comprehensive review
Published 2025“…This paper serves as a comprehensive background on localization algorithms and methods used in wireless sensor networks, offering insights for researchers to develop efficient localization algorithms tailored to specific application requirements in diverse work environments.…”
Get full text
Get full text
Get full text
Get full text
Article -
4
Automatic Textile Stain Detection Using Yolo Algorithm
Published 2024“…This research paper proposes a novel approach for automatic textile stain detection using the YOLO (You Only Look Once) algorithm, a state-of-the-art object detection model. …”
Get full text
Get full text
Get full text
Get full text
Article -
5
Design of DNA fragment assembly using IWP method on application-specific integrated-circuit / Hasniliati Hassan
Published 2017“…The method proposed is to design DNA assembly algorithms in Verilog HDL and implemented it in ASIC design flow. …”
Get full text
Get full text
Thesis -
6
An enhanced motion planning method for industrial robots based on the digital twin concept
Published 2025“…By integrating an improved Artificial potential field method, A* algorithm, and a synergistic approach combining 3-5-3 polynomial interpolation with particle swarm optimization, we effectively address the challenges of dynamic obstacle avoidance and trajectory optimization. …”
Get full text
Get full text
Thesis -
7
Brewing perfection: real-time monitoring of arabic coffee using iot and machine learning
Published 2026“…Using the YOLOv8 algorithm, a model was trained to detect and track the state of coffee in real time. …”
Get full text
Get full text
Get full text
Proceeding Paper -
8
Design And Development Of An Insect-Inspired Micro Air Vehicle
Published 2019“…With the allocated time and financial support, two wings are developed using traditional cut and glue method and advanced vacuum mold method. …”
Get full text
Get full text
Monograph -
9
-
10
Detecting and evaluating surface crack defect of building structure and infrastructure elements using Digital Image Processing approach / Nursyafiqah Razmi
Published 2018“…The thresholding algorithm was developed to detect the crack area and estimate the crack length by using MATLAB version 2015a and 2017a software. …”
Get full text
Get full text
Student Project -
11
Asset liability management model: The case of selected Islamic banks in Malaysia / Chong Hui Ling
Published 2017“…The multi-faceted objectives consist of the bank‟s expected returns and risks tolerance with constraints (also known as restraining functions to reflect the limitations placed on the Islamic bank‟s operating requirements), established using computational mathematics and algorithms with the aid of the MATLAB programming software. …”
Get full text
Get full text
Get full text
Thesis -
12
Automated defect detection in perfume bottle packaging using machine vision approach for improved quality control
Published 2025“…The system utilized a USB camera and MATLAB software to capture and analyze images of the bottles, employing a black and white detection method to identify imperfections. …”
Get full text
Get full text
Get full text
Get full text
Article -
13
Efficient Malware Detection And Response Model Using Enhanced Parallel Deep Learning (EPDL-MDR)
Published 2026“…Python 3.13 is used for dataset processing and EPDL model building. …”
thesis::doctoral thesis -
14
-
15
-
16
Application of genetic algorithm methods to optimize flowshop sequencing problem
Published 2008“…Genetic algorithm method was one of the methods that were widely used in solving optimization problem. …”
Get full text
Get full text
Undergraduates Project Papers -
17
-
18
Industrial datasets with ICS testbed and attack detection using machine learning techniques
Published 2021“…The performance metrics such as accuracy, precision, recall, F1 score are evaluated and cross validated for different ML algorithms for anomaly detection. The decision tree (DT) ML technique is optimized with pruning method which provides an attack detection accuracy of 96.5%. …”
Get full text
Get full text
Get full text
Get full text
Article -
19
Sizing optimization of large-scale grid connected photovoltaic system using dolphin echolocation algorithm / Muhammad Zakyizzuddin Rosselan
Published 2018“…Later, an Iterative-based Sizing Algorithm (ISA) was developed to determine the optimal sizing solution which was later used as benchmark for sizing algorithms using optimization methods. …”
Get full text
Get full text
Thesis -
20
An improved method using fuzzy system based on hybrid boahs for phishing attack detection
Published 2022“…Moreover, Butterfly Optimization Algorithm and Harmony Search Algorithm were combined as optimization method led to a new method named BOAHS. …”
Get full text
Get full text
Thesis
