Search Results - (( variable interactions search algorithm ) OR ( java application mining algorithm ))

Refine Results
  1. 1
  2. 2

    A new variable strength t-way strategy based on the cuckoo search algorithm by Abdullah, Nasser, Kamal Z., Zamli

    Published 2019
    “…Complementing existing works, this paper proposes a new variable strength cuckoo search algorithm, called VCS. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3
  4. 4

    Adopting A Particle Swarm-Based Test Generator Strategy For Variable-Strength And T-Way Testing by S. Ahmed, Bestoun

    Published 2011
    “…Recently, researchers have started to explore the use of Artificial Intelligence (AI)-based algorithms as t-way (where t indicates the interaction strength) and variable-strength testing strategies. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Fuzzy Adaptive Tuning of a Particle Swarm Optimization Algorithm for Variable-Strength Combinatorial Test Suite Generation by Kamal Z., Zamli, Ahmed, Bestoun S., Mahmoud, Thair, Afzal, Wasif

    Published 2018
    “…In real-world software testing, the input variables may vary in how strongly they interact, variable strength combinatorial interaction testing (VS-CIT) can exploit this for higher effectiveness. …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  7. 7

    Enhancing Harmony Search Metaheuristic Algorithm for Coverage Efficiency, Test Suite Reduction, and Running Time in Combinatorial Interaction Testing by Muazu, Aminu Aminu, Hashim, Ahmad Sobri

    Published 2025
    “…The effectiveness of these algorithms, also called metaheuristics, largely depends on the capabilities of their search techniques. …”
    Get full text
    Get full text
    Article
  8. 8

    A variable combinatorial test suite strategy based on modified greedy algorithm by Homaid, Ameen A. Ba, Alsewari, Abdulrahman A.

    Published 2015
    “…A variable strength interaction is the interaction between some of software features which have higher priority than the interaction between the others software features. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Mining Sequential Patterns Using I-PrefixSpan by Dhany , Saputra, Rambli Dayang, R.A., Foong, Oi Mean

    Published 2007
    “…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  11. 11

    Adapting the Elitism on the Greedy Algorithm for Variable Strength Combinatorial Test Cases Generation by Bahomaid, Ameen A., Alsewari, Abdulrahman A., Zamli, Kamal Z., Alsariera, Yazan A.

    Published 2018
    “…This study presented the most recent variable interaction strength (VS) CT strategy using an enhanced variant in the greedy algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Short-term electricity price forecasting in deregulated electricity market based on enhanced artificial intelligence techniques / Alireza Pourdaryaei by Alireza , Pourdaryaei

    Published 2020
    “…The proposed feature selection technique comprises of Multi-objective Binary-valued Backtracking Search Algorithm (MOBBSA). It is used to search within a number of input variables combinations and to select the feature subsets, which minimizes simultaneously vice-versa the estimation error and the feature numbers. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    Harmony search-based robust optimal controller with prior defined structure by Rafieishahemabadi, Ali

    Published 2013
    “…In this approach, a combination of interacting two levels HS optimization algorithm is presented. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16
  17. 17

    Development of genetic algorithm for optimization of yield models in oil palm production by Hilal, Yousif Y., Wan Ismail, Wan Ishak, Yahya, Azmi, Ash’aari, Zulfa Hanan

    Published 2018
    “…Owing to this great interest in the predictions, the study aims to develop a genetic algorithm (GA) to identify the relevant variables and search for the best combinations for modelling to examine the potential of oil palm production in Sarawak and Sabah, Borneo, Malaysia, under a given set of assumptions. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Development of two matheuristics for production-inventory-distribution routing problem / Dicky Lim Teik Kyee by Dicky Lim , Teik Kyee

    Published 2018
    “…Both algorithms are tested on a set of 90 benchmark instances with 50, 100 and 200 customers and 20 periods and the results are competitive when compared to the Memetic Algorithm with Population Management (MA|PM), Reactive Tabu Search (RTS) and Scatter Search (SS). …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
    Get full text
    Get full text
    Thesis
  20. 20

    Coronary artery stenosis detection and visualization / Tang Sze Ling by Tang, Sze Ling

    Published 2015
    “…The performance evaluation results show that the stenosis detection algorithm performs better average sensitivity than several state-of-the-art algorithms.…”
    Get full text
    Get full text
    Thesis