Search Results - (( using verification search algorithm ) OR ( java implementation force algorithm ))

  • Showing 1 - 18 results of 18
Refine Results
  1. 1
  2. 2

    Performance evaluation metrics for multi-objective evolutionary algorithms in search-based software engineering: systematic literature review by Nuh, Jamal Abdullahi, Koh, Tieng Wei, Baharom, Salmi, Osman, Mohd Hafeez, Kew, Si Na

    Published 2021
    “…Many recent studies have shown that various multi-objective evolutionary algorithms have been widely applied in the field of search-based software engineering (SBSE) for optimal solutions. …”
    Get full text
    Get full text
    Article
  3. 3

    Fuzzy logic-based hill climbing technique for photovoltaic maximum power point tracking converter by Taghvaee, Mohammad Hossein

    Published 2013
    “…Further experimental setup was carried out for comparative evaluation and the MPPT algorithm was implemented to performance verification of the algorithm by using digital signal processor (TMS320F28335). …”
    Get full text
    Get full text
    Thesis
  4. 4

    An efficient iris image thresholding based on binarization threshold in black hole search method by Danlami, Muktar, Ramli, Sofia Najwa, Jemain, Nur Izzah Syahira, Pindar, Zahraddeen, Jamel, Sapiee, Deris, Mustafa Mat

    Published 2018
    “…The aim of this research is to identify the suitable threshold value in order to locate the outer and lower boundaries using Black Hole Search Method. We chose these methods because of the ineffient features of the other methods in image indetification and verifications. …”
    Get full text
    Article
  5. 5

    Oral Dictionary by Md. Radzi, Ashylla

    Published 2006
    “…Since the output speed is critical, binary search tree algorithm is chosen as best data structure to be implemented in this application to improve the searching time performance. …”
    Get full text
    Get full text
    Final Year Project
  6. 6

    Very Large Scale Integration Cell Based Path Extractor For Physical To Layout Mapping In Fault Isolation Work by Pragasam, Matthew

    Published 2017
    “…To be able to retrieve all possible signals involved within a suspected boundary is a popular search computational problem. Therefore the path extractor program proposed incorporates the characteristics of a depth-first search algorithm by considering the specifications of a cell-based design. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Hand, Foot and Mouth Disease (HFMD)'s Hotspot Identification using Bipartite Network Model by Nor Shamira, Sabri

    Published 2020
    “…The location nodes in the targeted and validated models were ranked using the web-based search algorithms according to the respective ranking values. …”
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  8. 8
  9. 9

    Secure Access To Authorized Resources Based On Fingerprint Authentication by Elmadani, Ahmed Baba

    Published 2003
    “…The A VL tree is used to increase the compression ratio as its compression algorithm works efficiently for all types of data. …”
    Get full text
    Get full text
    Thesis
  10. 10

    A Hybrid Adaptive Leadership GWO Optimization with Category Gradient Boosting on Decision Trees Algorithm for Credit Risk Control Classification by Suihai, Chen, Chih How, Bong, Po Chan, Chiu

    Published 2024
    “…Secondly, an improved CatBoost algorithm (EBGWO-CatBoost) was proposed, which was a combination of improved GWO algorithm (EBGWO) and CatBoost algorithm, and the optimized GWO algorithm was used to offset the defects of CatBoost algorithm in parameter tuning. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    A Dual Recurrent Neural Network-based Hybrid Approach for Solving Convex Quadratic Bi-Level Programming Problem by WATADA, J., ROY, A., LI, J., WANG, B., WANG, S.

    Published 2020
    “…The accuracy and efficiency of the proposed method have been found better than the existing and widely used approaches, while doing experimental verification using four well-known examples used in prior works. …”
    Get full text
    Get full text
    Article
  12. 12

    An ensemble of neural network and modified grey wolf optimizer for stock prediction by Das, Debashish

    Published 2019
    “…In line with the No Free Lunch theorem which suggests that no single metaheuristic is the best for all optimization problems, the search for better algorithms is still a worthy endeavour. …”
    Get full text
    Get full text
    Thesis
  13. 13

    A Hybrid Evaluation Metric for Optimizing Classifier by Hossin, M., Sulaiman, M.N, Mustapha, A., Mustapha, N., Rahmat, R.W

    Published 2011
    “…However, the use of accuracy metric leads the searching process to the sub-optimal solutions due to its limited capability of discriminating values. …”
    Get full text
    Get full text
    Get full text
    Proceeding
  14. 14

    A hybrid evaluation metric for optimizing classifier by Hossin, Mohammad, Sulaiman, Md. Nasir, Mustapha, Aida, Mustapha, Norwati, O. K. Rahmat, Rahmita Wirza

    Published 2011
    “…However, the use of accuracy metric leads the searching process to the sub-optimal solutions due to its limited capability of discriminating values. …”
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15
  16. 16

    The impact of Xiaohongshu as the primary information hub: a case study among utar undergraduates by Eu, Jin Hau

    Published 2025
    “…While students appreciate the platform's speed, convenience, and emotional appeal, they remain concerned about the lack of professional verification, hidden advertising, and algorithmic repetition. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  17. 17

    Palm vein recognition using scale invariant feature transform with RANSAC mismatching removal by Shi Chuan, Soh, M. Z., Ibrahim, Marlina, Yakno, D.J., Mulvaney

    Published 2017
    “…The results shows that SIFT algorithm with RANSAC mis-matching point removal achieved better recognition rate than without mismatch-ing point removal technique used. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Book Chapter
  18. 18

    Identifying COVID-19 Hotspots using Bipartite Network Approach by Hong, Boon Hao

    Published 2023
    “…The location and human nodes were then ranked using a web-based search algorithm based on their respective ranking values. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis