Search Results - (( using verification search algorithm ) OR ( java implementation force algorithm ))
Search alternatives:
- implementation force »
- java implementation »
- using verification »
- force algorithm »
- search »
-
1
-
2
Performance evaluation metrics for multi-objective evolutionary algorithms in search-based software engineering: systematic literature review
Published 2021“…Many recent studies have shown that various multi-objective evolutionary algorithms have been widely applied in the field of search-based software engineering (SBSE) for optimal solutions. …”
Get full text
Get full text
Article -
3
Fuzzy logic-based hill climbing technique for photovoltaic maximum power point tracking converter
Published 2013“…Further experimental setup was carried out for comparative evaluation and the MPPT algorithm was implemented to performance verification of the algorithm by using digital signal processor (TMS320F28335). …”
Get full text
Get full text
Thesis -
4
An efficient iris image thresholding based on binarization threshold in black hole search method
Published 2018“…The aim of this research is to identify the suitable threshold value in order to locate the outer and lower boundaries using Black Hole Search Method. We chose these methods because of the ineffient features of the other methods in image indetification and verifications. …”
Get full text
Article -
5
Oral Dictionary
Published 2006“…Since the output speed is critical, binary search tree algorithm is chosen as best data structure to be implemented in this application to improve the searching time performance. …”
Get full text
Get full text
Final Year Project -
6
Very Large Scale Integration Cell Based Path Extractor For Physical To Layout Mapping In Fault Isolation Work
Published 2017“…To be able to retrieve all possible signals involved within a suspected boundary is a popular search computational problem. Therefore the path extractor program proposed incorporates the characteristics of a depth-first search algorithm by considering the specifications of a cell-based design. …”
Get full text
Get full text
Thesis -
7
Hand, Foot and Mouth Disease (HFMD)'s Hotspot Identification using Bipartite Network Model
Published 2020“…The location nodes in the targeted and validated models were ranked using the web-based search algorithms according to the respective ranking values. …”
Get full text
Get full text
Final Year Project Report / IMRAD -
8
Brain signatures: a modality for biometric authentication
Published 2009Get full text
Working Paper -
9
Secure Access To Authorized Resources Based On Fingerprint Authentication
Published 2003“…The A VL tree is used to increase the compression ratio as its compression algorithm works efficiently for all types of data. …”
Get full text
Get full text
Thesis -
10
A Hybrid Adaptive Leadership GWO Optimization with Category Gradient Boosting on Decision Trees Algorithm for Credit Risk Control Classification
Published 2024“…Secondly, an improved CatBoost algorithm (EBGWO-CatBoost) was proposed, which was a combination of improved GWO algorithm (EBGWO) and CatBoost algorithm, and the optimized GWO algorithm was used to offset the defects of CatBoost algorithm in parameter tuning. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
A Dual Recurrent Neural Network-based Hybrid Approach for Solving Convex Quadratic Bi-Level Programming Problem
Published 2020“…The accuracy and efficiency of the proposed method have been found better than the existing and widely used approaches, while doing experimental verification using four well-known examples used in prior works. …”
Get full text
Get full text
Article -
12
An ensemble of neural network and modified grey wolf optimizer for stock prediction
Published 2019“…In line with the No Free Lunch theorem which suggests that no single metaheuristic is the best for all optimization problems, the search for better algorithms is still a worthy endeavour. …”
Get full text
Get full text
Thesis -
13
A Hybrid Evaluation Metric for Optimizing Classifier
Published 2011“…However, the use of accuracy metric leads the searching process to the sub-optimal solutions due to its limited capability of discriminating values. …”
Get full text
Get full text
Get full text
Proceeding -
14
A hybrid evaluation metric for optimizing classifier
Published 2011“…However, the use of accuracy metric leads the searching process to the sub-optimal solutions due to its limited capability of discriminating values. …”
Get full text
Get full text
Conference or Workshop Item -
15
New differential cryptanalysis results for the lightweight block cipher BORON
Published 2023Article -
16
The impact of Xiaohongshu as the primary information hub: a case study among utar undergraduates
Published 2025“…While students appreciate the platform's speed, convenience, and emotional appeal, they remain concerned about the lack of professional verification, hidden advertising, and algorithmic repetition. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
17
Palm vein recognition using scale invariant feature transform with RANSAC mismatching removal
Published 2017“…The results shows that SIFT algorithm with RANSAC mis-matching point removal achieved better recognition rate than without mismatch-ing point removal technique used. …”
Get full text
Get full text
Get full text
Get full text
Book Chapter -
18
Identifying COVID-19 Hotspots using Bipartite Network Approach
Published 2023“…The location and human nodes were then ranked using a web-based search algorithm based on their respective ranking values. …”
Get full text
Get full text
Get full text
Get full text
Thesis
