Search Results - (( using evolution path algorithm ) OR ( software evaluation method algorithm ))

Refine Results
  1. 1

    The Development Of A Robust Algorithm For Uav Path Planning In 3d Environment by Kok, Kai Yit

    Published 2016
    “…Significant research has been conducted on Unmanned Aerial Vehicle (UAV) path planning using evolutionary algorithms, such as Particle Swarm Optimization (PSO), Genetic Algorithm (GA), Differential Evolution (DE), and Biogeographic-Based Optimization (BBO). …”
    Get full text
    Get full text
    Thesis
  2. 2

    Finding minimum path by using Genetic Algorithm (GA)/ Siti Zuraifah Hashim by Hashim, Siti Zuraifah

    Published 2007
    “…In this paper, GA has been applied to find the minimum path, then result will be compared with Dijkstra's algorithm are presented.…”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4
  5. 5

    A novel embedding method to increase capacity and robustness of low-bit encoding audio steganography technique using noise gate software logic algorithm by Ahmed, M.A., Kiah, M.L.M., Zaidan, B.B., Zaidan, A.A.

    Published 2010
    “…In the second step, standard 8th LSB layer embedding has been done for this desired signal. Audio quality evaluation has used to evaluate our purposed method in two ways. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6
  7. 7

    Literature Review of Optimization Techniques for Chatter Suppression In Machining by A. R., Yusoff, Mohamed Reza Zalani, Mohamed Suffian, Mohd Yusof, Taib

    Published 2011
    “…In this paper, it can be observed that for chatter suppression, optimization focuses on spindle design, tool path, cutting process, and variable pitch. Various algorithms can be applied in the optimization of machining problems; however, Differential Evolution is the most appropriate for use in chatter suppression, being less time consuming, locally optimal, and more robust than both Genetic Algorithms, despite their wide applications, and Sequential Quadratic Programming, which is a famous conventional algorithm.…”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Implementation Of Hardware Software Partitioning In Embedded System by Mohd Nor, Masyirah

    Published 2018
    “…In this paper, the heuristic method is used to evaluate the performance of PSO and GA algorithm in term of to achieve a best cost, total area and total execution time. …”
    Get full text
    Get full text
    Monograph
  9. 9

    Comparative analysis of spiral dynamic algorithm and artificial bee colony optimization for position control of flexible link manipulators by Nor Maniha, Abdul Ghani, Nizaruddin, M. Nasir, Azrul Azim, Abdullah Hashim

    Published 2024
    “…Interestingly, the manipulator's behaviours using the spiral dynamics algorithm for PID controller tuning were superior to those using alternative methods. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Software defect prediction framework based on hybrid metaheuristic optimization methods by Wahono, Romi Satria

    Published 2015
    “…The classification algorithm is a popular machine learning approach for software defect prediction. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    LEMABE: a novel framework to Improve analogy-based software cost estimation using learnable evolution model by Dashti, Maedeh, Gandoman, Taghi Javdani, Adeh, Dariush Hasanpoor, Zulzalil, Hazura, Md Sultan, Abu Bakar

    Published 2021
    “…Then, MMRE, PRED (0.25), and MdMRE criteria have been used to evaluate and compare the proposed method against other evolutionary algorithms. …”
    Get full text
    Get full text
    Article
  12. 12

    Fingerprint frontier: the evolution of biometric security by Khalifa, Othman Omran

    Published 2023
    “…The author believes that "Fingerprint Frontier: The Evolution of Biometric Security" will serve as a complete reference, shining light on the current landscape while exposing potential future paths in this ever-changing subject. …”
    Get full text
    Get full text
    Get full text
    Book
  13. 13

    Data depublication using : Hashing algorithm / Naimah Nayan by Nayan, Naimah

    Published 2019
    “…The objective of this project is to compare MD5 & SHA-1 algorithm in data deduplication technique and to evaluate the MD5 & SHA-1 algorithm, length of message digest and speed using deduplication software. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Experimental Model for Teaching Software Testing by Kamal Z., Zamli, Hasneeza, L. Zakaria

    Published 2015
    “…The topic of software testing in education has become appealing to some although most researchers focused on researching software testing tools and methods. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Analysis of tumour control probability, normal tissue complication probability and isotoxic effects for prostate cancer by Fauzee, Nurnada Syahrain Mohd

    Published 2016
    “…Eight prostate treatment plans with Collapsed Cone algorithm were evaluated in term of TCP, NTCP and isotoxic effect using BioSuite and BIOPLAN software. …”
    Get full text
    Get full text
    Monograph
  16. 16

    Comparison and evaluation of multiple sequence alignment tools in bininformatics by Sedaghatinia, Asieh, Atan, Rodziah, Tajul Arifin, Khairina, Azmi Murad, Masrah Azrifah

    Published 2009
    “…This study addresses this critical issue in relation to MSA algorithms by systematically comparing and evaluating the functionality, usability and the algorithms of three famous multiple sequence alignment tools. …”
    Get full text
    Article
  17. 17

    Modified Contrast Limited Adaptive Histogram Equalization for high dynamic range images by Tung, Li Qian

    Published 2012
    “…The algorithm was written by using MATLAB software. The local tone mapping method is based on the modified contrast limited adaptive histogram equalization (CLAHE) method. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Cross-project software defect prediction by Bala, Yahaya Zakariyau, Abdul Samat, Pathiah, Sharif, Khaironi Yatim, Manshor, Noridayu

    Published 2022
    “…In this work, five research questions covering the classification algorithms, dataset, independent variables, performance evaluation metrics used in CPDP studies, and as well as the performance of individual machine learning classification algorithms in predicting software defects across different software projects were addressed accordingly. …”
    Get full text
    Get full text
    Article
  19. 19
  20. 20