Search Results - (( automation evaluation techniques ) OR ( evolution computing techniques ))

Refine Results
  1. 1

    Fully automated subchondral bone segmentation from knee MR images: Data from the Osteoarthritis Initiative by Gandhamal, A., Talbar, S., Gajre, S., Razak, R., Hani, A.F.M., Kumar, D.

    Published 2017
    “…The performance of the developed technique is evaluated against ground truths by measuring sensitivity, specificity, dice similarity coefficient (DSC), average surface distance (AvgD) and root mean square surface distance (RMSD). …”
    Get full text
    Get full text
    Article
  2. 2

    Representation Of Rational Bézier Quadratics Using Genetic Algorithm, Differential Evolution And Particle Swarm Optimization by Yahya, Zainor Ridzuan

    Published 2013
    “…For each proposed soft computing technique, parameter tuning is done as an essential study. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4
  5. 5
  6. 6

    Differential evolution technique of HEPWM for three-phase voltage source inverter by Azziddin, Mohamad Razali, Kamisman, Norazelina, Jurifa, Mat Lazi, Bahari, Norhazilina

    Published 2016
    “…This paper presents the execution of Differential Evolution (DE) algorithm in order to understand the principle operation of Harmonic Elimination Pulse-Width Modulation (HEPWM) switching technique. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Harmonic Elimination Pulse Width Modulation Using Differential Evolution Technique For Three Phase Voltage Source Inverter by Kamisman, Norazelina

    Published 2018
    “…Differential Evolution (DE) has been gaining popularity among researchers as an effective yet simple evolutionary algorithm to solve the optimization problems. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Multi-fuzzer techniques for automated vulnerabilities assessments by Choy, Ein Jun

    Published 2025
    “…The automated framework generates detailed CVEs on discovered vulnerabilities and potential exploitation scenarios, significantly enhancing the security posture of the evaluated applications. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  9. 9

    Multi-fuzzer techniques for automated vulnerabilities assessments by Choy, Ein Jun

    Published 2025
    “…The automated framework generates detailed CVEs on discovered vulnerabilities and potential exploitation scenarios, significantly enhancing the security posture of the evaluated applications. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  10. 10

    Forward-Backward Time Stepping with Automated Edge-preserving Regularization Technique for Wood Defects Detection by Yong, Guang

    Published 2019
    “…The FBTS integrated with automated edge-preserving regularization technique is first assessed with object detection application. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Automated model-based test case generation using UML activity diagram by Monim, Md Abdul

    Published 2018
    “…Manually writing test cases approach is lengthy of time period and need more effort to accomplish the process. On the other hand, automated test case generation technique is the way to solve this issue and Model-Based Test case generation approach would be the appropriate for this automation process. …”
    Get full text
    Get full text
    Thesis
  12. 12

    StakeQP: a semi-automated stakeholder quantification and prioritisation technique for requirement selection in software system projects by Hujainah, Fadhl, Rohani, Abu Bakar, Abdulgabber, Mansoor Abdullateef

    Published 2019
    “…Hence, this study is aimed at proposing a new semi-automated technique called StakeQP to address the reported key limitations. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19

    Evaluating testing practice between automated and manual test: a case study in Openet Telecom Malaysia / Nora Muhammad Abdul Ghani by Muhammad Abdul Ghani, Nora

    Published 2013
    “…At the moment, Openet apply Manual and Automated test in their projects. As far as we concern, Automated testing have many advantages over Manual testing. …”
    Get full text
    Get full text
    Thesis
  20. 20

    On the automation of vulnerabilities fixing for web application by Umar, Kabir, Md Sultan, Abu Bakar, Zulzalil, Hazura, Admodisastro, Novia, Abdullah @ Selimun, Mohd Taufik

    Published 2014
    “…The research community have devoted considerable amount of efforts to address this problem by proposing many techniques for automated vulnerabilities detection and fix generation for web application. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item