Search Results - (( using factorization bat algorithm ) OR ( java application model algorithm ))

Refine Results
  1. 1

    A Preliminary Study on Camera Auto Calibration Problem Using Bat Algorithm by Mohd Annuar, Khalil Azha, Selamat, Nur Asmiza, Jaafar, Hazriq Izzuan, Mohamad, Syahrul Hisham

    Published 2013
    “…Each bat in Bat Algorithm represents a candidate solution for the problem and each dimension in the search space of the Bat Algorithm represents a parameter of intrinsic parameters: skew, focal length, and magnification factor. …”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    A study on the parameter selection of bat algorithm in in optimizing parameters in camera auto calibration problem by Mohd Said, Rahaini, A Aziz, Khairul Azha, Zainal Abidin, Amar Faiz, Mat Jizat, Jessnor Arif, Mohd Khairuddin, Ismail, Widiyanto, Sigit, Abdul Waduth, Mohamed Faisal

    Published 2022
    “…Each bat in the Bat Algorithm represents a potential solution to the issue, and each dimension in the Bat Algorithm's search space represents one of the basic parameters: skew, focal length, and magnification factor. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Application of Bat Algorithm and Its Modified Form Trained with ANN in Channel Equalization by Pradyumna Kumar Mohapatra, Saroja Kumar Rout, Sukant Kishoro Bisoy, Sandeep Kautish, Muzaffar Hamzah, Muhammed Basheer Jasser, Ali Wagdy Mohamed

    Published 2022
    “…Experimental and statistical analyses show that, in comparison with the bat as well as variants of the bat and state-of-the-art algorithms, the proposed algorithm substantially outperforms them significantly, based on MSE and BER.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  4. 4
  5. 5

    Comfort and energy consumption optimization in smart homes using bat algorithm with inertia weight by Mohamad Razwan, Abdul Malek, Nor Azlina, Ab. Aziz, Alelyani, Salem, Mohana, Mohamed, Farah Nur Arina, Baharudin, Zuwairie, Ibrahim

    Published 2022
    “…Moreover, the comfort level achieved by BA with exponential inertia weight is found to be better than previously reported works using firefly algorithm, genetic algorithm, ant colony optimization, and artificial bee colony algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  6. 6
  7. 7
  8. 8

    Real-time algorithmic music composition application. by Yap, Alisa Yi Hui

    Published 2022
    “…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  9. 9
  10. 10
  11. 11
  12. 12

    Delay and energy-aware routing for efficient data collection in wireless sensor networks / Ihsan Ali by Ihsan , Ali

    Published 2024
    “…To address relay node selection and data scheduling issues, Energy-Efficient Scheduling (EES) and Energy-Efficient Un-Scheduling (EEUS) methods have been introduced using the Improved Discrete Bat Algorithm (IDBA) along with the Adaptive Warshal Floyd algorithm (AWF). …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    A Toolkit for Simulation of Desktop Grid Environment by FOROUSHAN, PAYAM CHINI

    Published 2014
    “…In this type of environment it is nearly impossible to prove the effectiveness of a scheduling algorithm. Hence the main objective of this study is to develop a desktop grid simulator toolkit for measuring and modeling scheduler algorithm performance. …”
    Get full text
    Get full text
    Final Year Project
  14. 14

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…The objective of this study is to enhance the confidentiality and security of the image steganography application by combining cryptography algorithm. In this proposed model, the RSA algorithm is used to encrypt a secret message into an unreadable ciphertext before hiding it in the image. …”
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment by Ruzita, Ahmad

    Published 2013
    “…This thesis describes original research in the field of software quality model by presenting a Feature Ranking Algorithm (FRA) for Pragmatic Quality Factor (PQF) model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Quantum Inspired Computational Intelligence Techniques for Combined Economic Emission Dispatch Problem by MAHDI, FAHAD PARVEZ

    Published 2017
    “…Quantum computing phenomenon is integrated with swarm intelligence-based PSO and bat algorithm (BA) to make these algorithms computationally more powerful and robust.…”
    Get full text
    Get full text
    Thesis
  17. 17

    Hexagon pattern particle swarm optimization based block matching algorithm for motion estimation / Siti Eshah Che Osman by Che Osman, Siti Eshah

    Published 2019
    “…Due to the center biased nature of the videos, the HPSO algorithm uses an initial pattern (hexagon-shaped) to speed up the convergence of the algorithm. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Comparison of mabsa, PSO and GWO of PI-PD controller for dc motor by Nur Naajihah, Ab Rahman

    Published 2024
    “…The system demonstrated its effectiveness by reducing the transient response aspects by 40% to 90% and the standard deviation factor by 70% to 99% when compared to the PSO and GWO algorithms. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Network game (Literati) / Chung Mei Kuen by Chung, Mei Kuen

    Published 2003
    “…Therefore, efficient and robust servers that process separate client connections in separate threads are needed. Java applet is a well-known and widely used example of mobile code (a variation on the traditional client-server model). …”
    Get full text
    Get full text
    Thesis