Search Results - (( variable interaction selection algorithm ) OR ( java application customization algorithm ))

Refine Results
  1. 1

    CTJ: Input-output based relation combinatorial testing strategy using Jaya algorithm by Ng, Yeong Khang

    Published 2019
    “…Combinatorial testing can be divided into three types which are uniform strength interaction, variable strength interaction and input-output based relation (IOR). …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  2. 2

    Taguchi?s T-method with Normalization-Based Binary Bat Algorithm by Marlan Z.M., Jamaludin K.R., Harudin N.

    Published 2025
    “…Therefore, a variable selection technique using a swarm-based Binary Bat algorithm is proposed. …”
    Conference paper
  3. 3

    Fuzzy Adaptive Tuning of a Particle Swarm Optimization Algorithm for Variable-Strength Combinatorial Test Suite Generation by Kamal Z., Zamli, Ahmed, Bestoun S., Mahmoud, Thair, Afzal, Wasif

    Published 2018
    “…In real-world software testing, the input variables may vary in how strongly they interact, variable strength combinatorial interaction testing (VS-CIT) can exploit this for higher effectiveness. …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  4. 4

    Development of genetic algorithm for optimization of yield models in oil palm production by Hilal, Yousif Y., Wan Ismail, Wan Ishak, Yahya, Azmi, Ash’aari, Zulfa Hanan

    Published 2018
    “…This research concludes that the GA method is a user-friendly variable selection tool with excellent results because it can choose variables correctly.…”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Short-term electricity price forecasting in deregulated electricity market based on enhanced artificial intelligence techniques / Alireza Pourdaryaei by Alireza , Pourdaryaei

    Published 2020
    “…The proposed feature selection technique comprises of Multi-objective Binary-valued Backtracking Search Algorithm (MOBBSA). …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Development Of Fall Risk Clustering Algorithm In Older People by Wong, Kam Kang

    Published 2020
    “…A total of 1279 subjects and 9 variables from dataset (1411 subjects and 139 variables) are selected for clustering. t-Distributed Stochastic Neighbour Embedding (t-SNE) for feature extraction and K-means clustering algorithm achieved the highest performance in clustering, which grouping the subjects into Low (13%), Intermediate A (19%), Intermediate B (21%) and High (31%) fall risk group. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  7. 7

    The performance of Taguchi�s T-method with binary bat algorithm based on great value priority binarization for prediction by Marlan Z.M., Ramlie F., Jamaludin K.R., Harudin N.

    Published 2023
    “…In enhancing prediction accuracy, the T-method employed Taguchi�s orthogonal array as a variable selection approach to determine a subset of independent variables that are significant toward the dependent variable or output. …”
    Article
  8. 8

    CTJ: Input-output based relation combinatorial testing strategy using Jaya algorithm by Alsewari, Abdulrahman A., Ng, Yeong Khang, Kamal Z., Zamli, Mohammed E., Younis

    Published 2019
    “…Combinatorial testing can be divided into three types which are uniform strength interaction, variable strength interaction and input-output based relation (IOR). …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Development of an effective clustering algorithm for older fallers by Goh, Choon Hian, Wong, Kam Kang, Tan, Maw Pin *, Ng, Siew Cheok, Chuah, Yea Dat, Kwan, Ban Hoe

    Published 2022
    “…A total of 1279 subjects and 9 variables were selected for clustering after the data pre-possessing stage. …”
    Get full text
    Get full text
    Article
  10. 10

    Data driven neuroendocrine pid controller for mimo plants based adaptive safe experimentation dynamics algorithm by Mohd Riduwan, Ghazali

    Published 2020
    “…However, control accuracy is insufficient because the secretion rate and control variable error are not able to interact directly and limits the controller capability. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Determination of tree stem volume : A case study of Cinnamomum by Noraini Abdullah

    Published 2013
    “…A modeling approach is developed which focuses on the phases in the model-building procedures, effects of interactions variables on the model, minimizing the effects of multicollinearity on the variables and recommending remedial techniques to overcome them, identification of the significant variables by removing insignificant variables, selecting the best model using the eight selection criteria (8SCs), and finally using the residual analysis to validate the chosen best model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14
  15. 15

    Coronary artery stenosis detection and visualization / Tang Sze Ling by Tang, Sze Ling

    Published 2015
    “…The performance evaluation results show that the stenosis detection algorithm performs better average sensitivity than several state-of-the-art algorithms.…”
    Get full text
    Get full text
    Thesis
  16. 16

    Initialization procedure in solving Optimal Power Flow (OPF) using Artificial Immune System (AIS) optimization technique / Aimi Idzwan Tajudin by Tajudin, Aimi Idzwan

    Published 2007
    “…The programmed that has been used in this project is MATLAB, which provides a high level computing language and interactive environment for algorithm development, data visualization, data analysis and numerical analysis. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Robust generalized multiplicative scatter correction algorithm on pretreatment of near infrared spectral data by Silalahi, Divo Dharma, Midi, Habshah, Arasan, Jayanthi, Mustafa, Mohd Shafie, Caliman, Jean-Pierre

    Published 2018
    “…The sensor requires a spectrometer to produce some sufficient information called spectrum as interaction between physical matters of the sample with the electromagnetic spectrum. …”
    Get full text
    Get full text
    Article
  18. 18

    Harmony search-based robust optimal controller with prior defined structure by Rafieishahemabadi, Ali

    Published 2013
    “…In this approach, a combination of interacting two levels HS optimization algorithm is presented. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Removal of heavy metals from water by functionalized carbon nanotubes with deep eutectic solvents: An artificial neural network approach / Seef Saadi Fiyadh by Seef Saadi , Fiyadh

    Published 2019
    “…The modelling results revealed that NARX algorithm is the best compared to the used algorithms in term of accuracy. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Analysis using data mining techniques: the exploration and review data of diabetes patients / Syarifah Adilah Mohamed Yusoff ... [et al.] by Mohamed Yusoff, Syarifah Adilah, Othman, Jamal, Johan, Elly Johana, Mohd Mydin, Azlina, Wan Mohamad, Wan Anisha

    Published 2025
    “…In this statistical summary procedure, the distribution of attributes and their interactions are crucial for accurately processing the data in accordance with the selected classification or data mining techniques to be performed. …”
    Get full text
    Get full text
    Get full text
    Article