Search Results - (( software selection method algorithm ) OR ( parallel optimization path algorithm ))

Refine Results
  1. 1

    Tool path generation of contour parallel based on ant colony optimisation by Abdullah, Haslina, Ramli, Rizauddin, Abd Wahab, Dzuraidah, Abu Qudeiri, Jaber

    Published 2016
    “…An Ant Colony Optimisation (ACO) method is used to optimize the tool path length because of its capability to find the shortest tool path length. …”
    Get full text
    Get full text
    Article
  2. 2
  3. 3
  4. 4

    Restoration planning strategy of transmission system based on optimal energizing time of sectionalizing islands / Dian Najihah Abu Talib by Dian Najihah , Abu Talib

    Published 2019
    “…There are two discrete optimization techniques used in this work, which are the Artificial Bee Colony algorithm and Evolutionary Programming. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Software defect prediction framework based on hybrid metaheuristic optimization methods by Wahono, Romi Satria

    Published 2015
    “…For the purpose of this study, ten classification algorithms have been selected. The selection aims at achieving a balance between established classification algorithms used in software defect prediction. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Software metrics selection model for predicting maintainability of object-oriented software using genetic algorithms by Bakar, Abubakar Diwani

    Published 2016
    “…To predict software maintainace, the proper metrics need to be selected to avoid the duplication or the outlying of the potential metrics. …”
    Get full text
    Get full text
    Thesis
  7. 7

    A novel large-bit-size architecture and microarchitecture for the implementation of Superscalar Pipeline VLIW microprocessors by Lee, Weng Fook

    Published 2008
    “…Different adder architectures are investigated for suitability on synthesis implementation of large data bus size adder for efficient usage within the ALU. An adder algorithm using repetitive constructs in a parallel algorithm that allows for efficient and optimal synthesis for large data bus size is proposed as a suitable implementation for the adder within the ALU. …”
    Get full text
    Thesis
  8. 8
  9. 9
  10. 10

    Depth linear discrimination-oriented feature selection method based on adaptive sine cosine algorithm for software defect prediction by Nasser, Abdullah, H.M. Ghanem, Waheed Ali, H.Y. Saad, Abdul-Malik, Hamed Abdul-Qawy, Antar Shaddad, A. Ghaleb, Sanaa A, Mohammed Alduais, Nayef Abdulwahab, Din, Fakhrud, Ghetas, Mohamed

    Published 2024
    “…To address these challenges, this research introduces a novel Depth Linear Discrimination-Oriented Feature Selection Method based on Adaptive Sine Cosine Algorithm, named Depth Adaptive Sine Cosine Feature Selection (DASC-FS). …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11
  12. 12
  13. 13
  14. 14

    Metric's thresholds for encoding evolutionary computing representation in software engineering problem by Md Sultan, Abu Bakar, Din, Jamilah, Zulzalil, Hazura, Bakar, Abubakar Diwani

    Published 2015
    “…Algorithm was tested to metric selection problem using Genetic Algorithm and the results obtained are promising.…”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Cross-project software defect prediction by Bala, Yahaya Zakariyau, Abdul Samat, Pathiah, Sharif, Khaironi Yatim, Manshor, Noridayu

    Published 2022
    “…In this work, five research questions covering the classification algorithms, dataset, independent variables, performance evaluation metrics used in CPDP studies, and as well as the performance of individual machine learning classification algorithms in predicting software defects across different software projects were addressed accordingly. …”
    Get full text
    Get full text
    Article
  16. 16

    AGENT MEETING SCHEDULER by ZAINAL ABIDIN, NURAINI

    Published 2011
    “…An agent meeting scheduler prototype then will be developed to prove that the selected algorithm is working properly. Qualitative research method is being used to gather necessary data on agent algorithm and this data will be used to select the suitable algorithm. …”
    Get full text
    Get full text
    Final Year Project
  17. 17
  18. 18

    A 'snowflake' geometrical representation for optimised degree six 3-modified chordal ring networks by Chien, Stephen Lim Een, Raja Maamor Shah, Raja Noor Farah Azura, Othman, Mohamed

    Published 2016
    “…A tree visualisation was constructed based on its connectivity to enable the generation of formulae for optimal diameter and average optimal path lengths. …”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Detection of black hole nodes in mobile ad hoc network using hybrid trustworthiness and energy consumption techniques by Mustafa, Ahmed Sudad

    Published 2017
    “…In this thesis, a hybrid detection algorithm mechanism has been proposed which combines two detection algorithms based on nodes’ trustworthiness and energy consumption in a parallel manner in order to detect the black hole nodes. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20