Search Results - (( using optimization method algorithm ) OR ( software verification using algorithm ))
Search alternatives:
- software verification »
- verification using »
- method algorithm »
- using algorithm »
-
1
Fingerprint verification using clonal selection algorithm / Farah Syadiyah Shamsudin
Published 2017“…There will be two processes involved, which are feature extraction using minutiae-based method and also the implementation of the proposed algorithm, CSA. …”
Get full text
Get full text
Thesis -
2
Development of optimized damage prediction method for health monitoring of ultra high performance fiber-reinforced concrete communication tower
Published 2018“…In addition, a simple procedure is proposed to determine the optimal solution and predict the correlation factor and the frequency of the damaged communication tower by using the particle swarm optimization (PSO) method. …”
Get full text
Get full text
Thesis -
3
Computational dynamic support model for social support assignments around stressed individuals among graduate students
Published 2020“…The algorithm complexity analysis was used to measure the execution time in the worst case. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
4
Face recognition using PZMI, ANN and Ant colony algorithms / Milad Miri
Published 2018“…Algorithms developed for face recognition are tightly related to the rate of extracted face features. …”
Get full text
Get full text
Get full text
Thesis -
5
Numerical simulation and experimental verification on distortions induced by wire-arc additive manufacturing components and costing analysis / Keval Priapratama Prajadhiana
Published 2024“…On analysing the distortion effect by means of numerical computation method, a commercial specialized simulation software Simufact.Welding was used in the development of the numerical model. …”
Get full text
Get full text
Thesis -
6
An enhanced motion planning method for industrial robots based on the digital twin concept
Published 2025“…By integrating an improved Artificial potential field method, A* algorithm, and a synergistic approach combining 3-5-3 polynomial interpolation with particle swarm optimization, we effectively address the challenges of dynamic obstacle avoidance and trajectory optimization. …”
Get full text
Get full text
Thesis -
7
A fictitious reference iterative tuning method for buck converter-powered DC motor control system
Published 2019“…This paper presents a model-free optimization algorithm for a PID controller based on Fictitious Reference Iterative Tuning and Simulated Kalman Filter. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
-
9
Minimization of torque ripple and flux droop using optimal DTC switching and sector rotation strategy
Published 2022“…A five-level cascaded H-bridge (CHB) inverter was used in the optimal DTC switching strategy because it had many voltage vectors and could be used for a variety of speed operations. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
-
11
-
12
Face recognition for identify verification in exams locations
Published 2023“…It also needs to be fast for quick verification. The project uses a mix of hardware and software tools. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
13
Feature extraction using active appearance model algorithm with Bayesian classification approach
Published 2013Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Application of genetic algorithm methods to optimize flowshop sequencing problem
Published 2008“…Genetic algorithm method was one of the methods that were widely used in solving optimization problem. …”
Get full text
Get full text
Undergraduates Project Papers -
15
-
16
Implementation Of FPGA Based Encryption Chip Using VHD - Data Encryption Standard (DES) Algorithm
Published 2006“…In third stage, compilation and simulation for source code verification purpose is done to yield the correct output by using Altera Quartus II 5.0 software. …”
Get full text
Get full text
Monograph -
17
Building norms-adaptable agents from Potential Norms Detection Technique (PNDT)
Published 2023Short Survey -
18
Sizing optimization of large-scale grid connected photovoltaic system using dolphin echolocation algorithm / Muhammad Zakyizzuddin Rosselan
Published 2018“…Later, an Iterative-based Sizing Algorithm (ISA) was developed to determine the optimal sizing solution which was later used as benchmark for sizing algorithms using optimization methods. …”
Get full text
Get full text
Thesis -
19
An improved method using fuzzy system based on hybrid boahs for phishing attack detection
Published 2022“…Moreover, Butterfly Optimization Algorithm and Harmony Search Algorithm were combined as optimization method led to a new method named BOAHS. …”
Get full text
Get full text
Thesis -
20
Performance evaluation metrics for multi-objective evolutionary algorithms in search-based software engineering: systematic literature review
Published 2021“…The preliminary results show that remarkable studies were reported without considering performance metrics for the purpose of algorithm evaluation. Based on the 27 performance metrics that were identified, hypervolume, inverted generational distance, generational distance, and hypercube-based diversity metrics appear to be widely adopted in most of the studies in software requirements engineering, software design, software project management, software testing, and software verification. …”
Get full text
Get full text
Article
