Search Results - (( variable detection search algorithm ) OR ( java application customization algorithm ))
Search alternatives:
- customization algorithm »
- variable detection »
- detection search »
- java application »
-
1
An improved negative selection algorithm based on the hybridization of cuckoo search and differential evolution for anomaly detection
Published 2018“…Real-Valued Negative Selection Algorithm with Variable-Sized Detectors (V-Detectors) is an offspring of AIS and demonstrated its potentials in the field of anomaly detection. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
Adopting A Particle Swarm-Based Test Generator Strategy For Variable-Strength And T-Way Testing
Published 2011“…Many AI-based strategies have been developed, such as Ant Colony, Simulated Annealing, Genetic Algorithm, and Tabu Search. Although useful, most existing AI-based strategies adopt complex search processes and require heavy computations. …”
Get full text
Get full text
Thesis -
3
Deterministic Mutation-Based Algorithm for Model Structure Selection in Discrete-Time System Identification
Published 2011“…Since EC, like genetic algorithm, relies on randomness and probabilities, it is cumbersome when constraints are present in the search. …”
Get full text
Get full text
Get full text
Article -
4
Road Sign Detection and Recognition System for Real-Time Embedded Applications
Published 2011Get full text
Get full text
Get full text
Conference or Workshop Item -
5
A Pairwise Test Suite Generator based on Melody Search Algorithm
Published 2016“…Abstract. Melody Search Algorithm (MS) has been adopted to solve many optimization problems such as combinatorial testing. …”
Get full text
Get full text
Get full text
Get full text
Article -
6
Coronary artery stenosis detection and visualization / Tang Sze Ling
Published 2015“…The performance evaluation results show that the stenosis detection algorithm performs better average sensitivity than several state-of-the-art algorithms.…”
Get full text
Get full text
Thesis -
7
Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things
Published 2022“…The reason for using variable length searching is its effectiveness in searching for high dimensional space and reducing the number of candidates' features. …”
Get full text
Get full text
Thesis -
8
Fuzzy Adaptive Tuning of a Particle Swarm Optimization Algorithm for Variable-Strength Combinatorial Test Suite Generation
Published 2018“…In real-world software testing, the input variables may vary in how strongly they interact, variable strength combinatorial interaction testing (VS-CIT) can exploit this for higher effectiveness. …”
Get full text
Get full text
Get full text
Book Chapter -
9
Integrated face detection approach for far image application
Published 2016“…Therefore, the need of a robust and efficient face detection algorithm is required to tackle these problems. …”
Get full text
Get full text
Thesis -
10
A Pairwise Test Suite Generator based on Melody Search Algorithm
Published 2016“…Melody Search Algorithm (MS) has been adopted to solve many optimization problems. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
11
Enhancing Harmony Search Metaheuristic Algorithm for Coverage Efficiency, Test Suite Reduction, and Running Time in Combinatorial Interaction Testing
Published 2025“…The effectiveness of these algorithms, also called metaheuristics, largely depends on the capabilities of their search techniques. …”
Get full text
Get full text
Article -
12
Improvement on rooftop classification of worldview-3 imagery using object-based image analysis
Published 2019“…Furthermore, a systematic feature selection approach was proposed in which search algorithms (Ant-Search, Best First-Search and Particle Swamp Optimization (PSO) - Search) performance were evaluated to select the most significant features. …”
Get full text
Get full text
Thesis -
13
Robust remote heart rate estimation from multiple asynchronous noisy channels using autoregressive model with Kalman filter
Published 2019“…Also, it indicates that our algorithm can be used for the online environment. Finally, the application of our algorithm in search and rescue scenarios using drones is considered and an experiment is conducted to investigate the algorithm's potential to be embedded in drones.…”
Get full text
Get full text
Article -
14
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
15
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
New global maximum power point tracking and modular voltage equalizer topology for partially shaded photovoltaic system / Immad Shams
Published 2022“…The search space skipping method has been proposed to improve the CS. …”
Get full text
Get full text
Get full text
Thesis
