Search Results - (( using factorization based algorithm ) OR ( using evolution method algorithm ))

Refine Results
  1. 1
  2. 2

    A Detection Method for Text Steganalysis Using Evolution Algorithm (EA) Approach by Puriwat, Lertkrai

    Published 2012
    “…Therefore, this research employed a detection factor based on the evolution algorithm method for text steganalysis. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    LEMABE: a novel framework to Improve analogy-based software cost estimation using learnable evolution model by Dashti, Maedeh, Gandoman, Taghi Javdani, Adeh, Dariush Hasanpoor, Zulzalil, Hazura, Md Sultan, Abu Bakar

    Published 2021
    “…Then, MMRE, PRED (0.25), and MdMRE criteria have been used to evaluate and compare the proposed method against other evolutionary algorithms. …”
    Get full text
    Get full text
    Article
  4. 4

    Balancing Exploitation And Exploration Search Behavior On Nature-Inspired Clustering Algorithms by Alswaitti, Mohammed Y. T.

    Published 2018
    “…In the OGC framework, the exhibited explorative search behavior of the Gravitational Clustering (GC) algorithm has been addressed by (i) eliminating the agent velocity accumulation, and (ii) integrating an initialization method of agents using variance and median to subrogate the exploration process. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Optimal placement of unified power flow controller by dynamic implementation of system-variable-based voltage-stability indices to enhance voltage stability by Ahmad, S., Albatsh, F.M., Mekhilef, Saad, Mokhlis, Hazlie

    Published 2016
    “…Furthermore, to verify the suitability of the explored locations, a comparative study has been conducted after placing UPFC in the present locations and other locations obtained using optimization techniques like particle swarm optimization (PSO), differential evolution (DE), genetic algorithm (GA), and bacteria foraging algorithm (BFA). …”
    Get full text
    Get full text
    Article
  6. 6

    A modified group authentication scheme for machine type communication in LTE/LTE-a networks by Ismail, Haqi Khalid

    Published 2018
    “…Therefore, this research proposes a modified group authentication scheme for MTC in an LTE/LTE-A network in order to reduce signalling and computational overheads. The proposed method adopts two efficient algorithms, namely, the Encapsulated Double and Add algorithms which depend on the Tate Pairing form by the bilinear pairing cryptography. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Class binarization with self-adaptive algorithm to improve human activity recognition by Zainudin, Muhammad Noorazlan Shah

    Published 2018
    “…Therefore, feature selection using Relief-f with self-adaptive Differential Evolution (rsaDE) algorithm is proposed to select the most significant features. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Crossover and mutation operators of real coded genetic algorithms for global optimization problems by Lim, Siew Mooi

    Published 2016
    “…The rationale behind developing algorithms using real encoding of chromosome representations is the limitations of binary encoding. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Shear strength test on unsaturated soil using natural microscopic surface tension force / Basharudin Abdul Hadi by Abdul Hadi, Basharudin

    Published 2017
    “…The research also provides a streamflow prediction using the Artificial Neural Network (ANN) method as another tool for assessment. …”
    Get full text
    Get full text
    Book Section
  10. 10

    Stock market turning points rule-based prediction / Lersak Photong … [et al.] by Photong, Lersak, Sukprasert, Anupong, Boonlua, Sutana, Ampant, Pravi

    Published 2021
    “…From news classification and news sentiment, a rule-based algorithm was used to predict the stock market turning points. …”
    Get full text
    Get full text
    Book Section
  11. 11

    Dynamic transmit antenna shuffling scheme for hybrid multiple-input multiple-output in layered architecture by Chong, Jin Hui

    Published 2010
    “…Special training sequences are used in the least square (LS) channel estimation method to obtain a desirable crest-factor, which is defined as the ratio of peak amplitude of waveform to the root mean square (RMS) value of the waveform, of the transmitted training signal and eliminate the influence of inter-symbol interference (ISI) on the channel estimation performance. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Parameter Estimation Using Improved Differential Evolution And Bacterial Foraging Algorithms To Model Tyrosine Production In Mus Musculus(Mouse) by Jia, Xing Yeoh, Chuii, Khim Chong, Mohd Saberi, Mohamad, Yee, Wen Choon, Lian, En Chai, Safaai, Deris, Zuwairie, Ibrahim

    Published 2015
    “…The hybrid of Differential Evolution algorithm with Kalman Filtering and Bacterial Foraging algorithm is a novel global optimisation method implemented to obtain the best kinetic parameter value. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Voltage stability margin identification using evolution programming learning algorithm / Zamzuhairi Darus by Darus, Zamzuhairi

    Published 2003
    “…This project proposed on an investigation on the voltage stability margin identification using evolution programming learning algorithm. A multilayer feed-forward artificial neural network (ANN) with evolution programming learning algorithm for calculation of voltage stability margins (VSM). …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15
  16. 16

    Model predictive control based on Lyapunov function and near state vector selection of four-leg inverter / Abdul Mannan Dadu by Abdul Mannan, Dadu

    Published 2018
    “…Due to the evolution of high processing microprocessors, the model predictive control (MPC) has been widely used in power electronic applications. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Fitness value based evolution algorithm approach for text steganalysis model by Din, Roshidi, Samsudin, Azman, Tuan Muda, Tuan Zalizam, Lertkrai, P., Amphawan, Angela, Omar, Mohd Nizam

    Published 2013
    “…In this paper, we present a new alternative method for text steganalysis based on an evolution algorithm, implemented using the Java Evolution Algorithms Package (JEAP).The main objective of this paper is to detect the existence of hidden messages ased on fitness values of a text description.It is found that the detection performance has been influenced by two groups of fitness values which are good fitness value and bad fitness value. …”
    Get full text
    Get full text
    Article
  18. 18

    Evolution Performance of Symbolic Radial Basis Function Neural Network by Using Evolutionary Algorithms by Alzaeemi, Shehab Abdulhabib, Tay, Kim Gaik, Huong, Audrey, Sathasivam, Saratha, Majahar Ali, Majid Khan

    Published 2023
    “…The SRBFNN’s objective function that corresponds to Satisfiability logic programming can be minimized by different algorithms, including Genetic Algorithm (GA), Evolution Strategy Algorithm (ES), Differential Evolution Algorithm (DE), and Evolutionary Programming Algorithm (EP). …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Multi-directional matrix converter for low power application using field-programmable gate array by Toosi, Saman

    Published 2015
    “…This study also derived necessary equation for proposed modulation method as well as detail of analysis and modulation algorithm. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Evolution Performance of Symbolic Radial Basis Function Neural Network by Using Evolutionary Algorithms by Shehab Abdulhabib Alzaeemi, Shehab Abdulhabib Alzaeemi, Kim Gaik Tay, Kim Gaik Tay, Audrey Huong, Audrey Huong, Saratha Sathasivam, Saratha Sathasivam, Majahar Ali, Majid Khan

    Published 2023
    “…The SRBFNN’s objective function that corresponds to Satisfiability logic programming can be minimized by different algorithms, including Genetic Algorithm (GA), Evolution Strategy Algorithm (ES), Differential Evolution Algorithm (DE), and Evolutionary Programming Algorithm (EP). …”
    Get full text
    Get full text
    Get full text
    Article