Search Results - (( data distribution bat algorithm ) OR ( _ validation ((new algorithm) OR (based algorithm)) ))

Refine Results
  1. 1

    A New Bats Echolocation-based Algorithm for Single Objective Optimisation by N. M., Yahya, Tokhi, M. Osman, Kasdirin, Hyreil Anuar

    Published 2016
    “…With this in mind, an adaptive bats sonar algorithm is introduced with new paradigms of real bats echolocation behaviour. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Efficient signaling schedule for centralized and distributed scheduling algorithms for wimax multi-hop relay networks by Saqer, Ahmad Sabri Mousa

    Published 2012
    “…Validation of the proposed algorithm (MR-CSA) was based on comparison of its performance with the performance of the centralized pairing algorithm while the proposed MR-DSA algorithm was validated through comparing its performance against that of the factor-graph-based low-complexity distributed scheduling algorithm (FGDS) algorithms in terms of throughput and the average packet throughput. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Key schedule algorithm based on coordinate geometry of a three-dimensional hybrid cube by Mushtaq, Muhammad Faheem

    Published 2019
    “…This research proposed a new Key Schedule Algorithm based on the coordinate geometry of a Hybrid Cube (KSAHC) for the non-binary block cipher. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Validation on an enhanced dendrite cell algorithm using statistical analysis by Mohamad Mohsin, Mohamad Farhan, Hamdan, Abdul Razak, Abu Bakar, Azuraliza, Abd Wahab, Mohd Helmy

    Published 2017
    “…This study demonstrates the mechanism of evaluating an enhanced algorithm using performance metrics and validated it using statistical analysis. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Gravitational search – bat algorithm for solving single and bi-objective of non-linear functions by Abbas, Iraq Tareq

    Published 2018
    “…The use of the BOGSA algorithm aims to create a new equation for the calculation of the masses of population individuals, as found in the theoretical work in the Strength Pareto Evolutionary Algorithm two (SPEAII) algorithm. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Improving performance of automated coronary arterial tree center-line extraction, stent localization and tracking by Boroujeni, Farsad Zamani

    Published 2012
    “…The experimental results show that combining the advantages of the geometric based validation and contrast based filtering as well as avoiding large quantization errors, lead to significant enhancement in the performance of the seed point detection algorithm in terms of balancing between the precision and recall. …”
    Get full text
    Get full text
    Thesis
  8. 8

    New perturb and observe algorithm based on trapezoidal rule: uniform and partial shading conditions by Mahmod Mohammad Altwallbah, Neda, Mohd Radzi, Mohd Amran, Azis, Norhafiz, Shafie, Suhaidi, Mohd Zainuri, Muhammad Ammirrul Atiqi

    Published 2022
    “…The new algorithm allows the search to continue until the extremum maximum is identified among numerous local maximums, rather than being imprisoned at one of the local maximums as is the case with the standard algorithm. …”
    Get full text
    Get full text
    Article
  9. 9

    March-based diagnosis algorithm for static random-access memory stuck-at faults and transition faults by Mat Isa, Masnita

    Published 2012
    “…Therefore, this thesis proposed a new two phase algorithm based on March tests to specifically distinguish the two faults. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Development of a new algorithm for segmentation of flotation froth images by Jahedsaravani, Ali, Marhaban, Mohammad Hamiruce, Massinaei, Mohammad, Saripan, M. Iqbal, Mehrshad, Naser, Mohd Noor, Samsul Bahari

    Published 2014
    “…Froth segmentation is a useful procedure that can determine the bubble size distribution. Several algorithms have been proposed in this field, but marker-based watershed transform shows the best performance. …”
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    Linear-pso with binary search algorithm for DNA motif discovery / Hazaruddin Harun by Harun, Hazaruddin

    Published 2015
    “…Evaluation of these algorithms showed that the results are unsatisfactory due to the lower validity and accuracy of these algorithms. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    An improved method using fuzzy system based on hybrid boahs for phishing attack detection by Noor Syahirah, Nordin

    Published 2022
    “…The algorithms involved were Genetic Algorithm, Differential Evolution Algorithm, Particle Swarm Optimization, Butterfly Optimization Algorithm, Teaching-Learning-Based Optimization Algorithm, Harmony Search Algorithm and Gravitational Search Algorithm. …”
    Get full text
    Get full text
    Thesis
  15. 15

    New random approaches of modified adaptive bats sonar algorithm for reservoir operation optimization problems by Nor Shuhada, Ibrahim

    Published 2024
    “…Thirdly, the thesis validates the algorithm's performance on standard constrained single objective and multi objective benchmark test functions. …”
    Get full text
    Get full text
    Thesis
  16. 16

    A New Unsupervised Validation Index Model Suitable for Energy-Efficient Clustering Techniques in VANET by Abdulrazzak H.N., Hock G.C., Mohamed Radzi N.A., Tan N.M.L.

    Published 2024
    “…Clustering evaluation techniques are important to check the clustering algorithm quality. High cluster similarity help to reduce the distance between a node to node within the cluster, also good separation was more important to avoid overlapping clusters. …”
    Article
  17. 17

    Sketch-based 3D modeling of symmetric objects from wireframe sketches on paper by Yahya, Zahrah

    Published 2016
    “…The results of the validation show a complete similarity between each original face and the output from our algorithm. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Dynamic determinant matrix-based block cipher algorithm by Juremi, Julia

    Published 2018
    “…The output from the DDBC algorithm will be tested and validated through NIST Statistical Test Suite. …”
    Get full text
    Get full text
    Thesis
  19. 19

    DATA CLASSIFICATION SYSTEM WITH FUZZY NEURAL BASED APPROACH by LUONG, TRUNG TUAN

    Published 2005
    “…Lying hidden in all this data is potentially useful information that is rarely made explicit or taken advantage. New tools based both on clever applications of established algorithms and on new methodologies, empower us to do entirely new things. …”
    Get full text
    Get full text
    Final Year Project
  20. 20

    Optimal power flow based on fuzzy linear programming and modified Jaya algorithms by Alzihaymee, Warid Sayel Warid

    Published 2017
    “…The proposed algorithms have been examined and validated using the IEEE 30-bus and IEEE 118-bus test systems. …”
    Get full text
    Get full text
    Thesis