Search Results - (( based application among algorithm ) OR ( some application using algorithmic ))*

Refine Results
  1. 1

    An artificial immune system model as talent performance predictor / Siti ‘Aisyah Sa’dan, Hamidah Jantan and Mohd Hanapi Abdul Latif by Sa’dan, Siti ‘Aisyah, Jantan, Hamidah, Abdul Latif, Mohd Hanapi

    Published 2016
    “…Immune based algorithm is part of bio-inspired algorithms elicits theories which can act as an inspiration for computer-based solutions. …”
    Get full text
    Get full text
    Research Reports
  2. 2
  3. 3
  4. 4

    A novel swarm-based optimisation algorithm inspired by artificial neural glial network for autonomous robots by Ismail, Amelia Ritahani, Tumian, Afidalina

    Published 2019
    “…Several areas of engineering have adopted the idea that swarms can solve complex problems and some of them are described in [13]. Some of the examples highlighted by [13] are a combinatorial optimisation, routing communications network, as well as solving robotics applications. …”
    Get full text
    Get full text
    Monograph
  5. 5
  6. 6

    Content-based recommender system for an academic social network / Vala Ali Rohani by Vala Ali, Rohani

    Published 2014
    “…Collaborative and content-based are the recommendation techniques typically used in existing RSs. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Token based path allocation approach for mobile robots in sorting centre for achieving high throughput by Khoo, Zong Zheng

    Published 2024
    “…Thus, it is crucial to guaranteed that these robots avoid collisions and deadlocks among each other while executing tasks. There are some previous approaches that provides different sets of assumptions on the road systems, planning algorithms and layouts. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  8. 8
  9. 9

    Vision Based Calibration and Localization Technique for Video Sensor Networks by Mohamed Sharif, Sharif Amar Mohamed Sharif

    Published 2009
    “…Very few of these localization algorithms use vision based technique. In this work, a vision based technique is proposed for localizing and configuring the camera nodes in video wireless sensor networks. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Opposition- based simulated kalman filters and their application in system identification by Kamil Zakwan, Mohd Azmi

    Published 2017
    “…Among the various kinds of optimization algorithms, Simulated Kalman Filter (SKF) is a new population-based optimization algorithm inspired by the estimation capability of Kalman Filter. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12
  13. 13

    African Buffalo Optimization Algorithm Based T-Way Test Suite Generation Strategy for Electronic-Payment Transactions by Odili, Julius Beneoluchi, Noraziah, Ahmad, Nasser, Abdullah B., Abd. Wahab, Mohd Helmy, Ahmed, Mashuk

    Published 2021
    “…In the implementation of t-way strategies (the t is used to represent the interaction strength), mixed results have been reported; some very exciting but, in other cases, the performance of metaheuristics has been, to say the least, below par. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14
  15. 15
  16. 16

    African buffalo optimization algorithm based t-way test suite generation strategy for electronic-payment transactions by B. Odili, Julius, B. Nasser, Abdullah, A., Noraziah, Abd Wahab, Mohd Helmy, Ahmed, Mashuk

    Published 2022
    “…In the implementa�tion of t-way strategies (the t is used to represent the interaction strength), mixed results have been reported; some very exciting but, in other cases, the perfor�mance of metaheuristics has been, to say the least, below par. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Partitional clustering algorithms for highly similar and sparseness y-short tandem repeat data / Ali Seman by Seman, Ali

    Published 2013
    “…Six Y-STR data sets were used as a benchmark to evaluate the performances of the algorithm against the other eight partitional clustering algorithms. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Mobile banking Trojan detection using Naive Bayes / Anis Athirah Masmuhallim by Masmuhallim, Anis Athirah

    Published 2024
    “…Unfortunately, the abundance of mobile applications and lax management of some app stores has led to potential risks for mobile users, including privacy breaches and malicious deductions of fees, among other adverse consequences. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20