Search Results - (( java application stemming algorithm ) OR ( future direction using algorithm ))
Search alternatives:
- application stemming »
- stemming algorithm »
- java application »
- future direction »
- direction using »
- using algorithm »
-
1
Symbiotic organisms search optimization algorithm in cloud computing: a nature-inspired meta-heuristic
Published 2022“…This paper proposes to investigate symbiotic organisms search algorithms used in handling various optimisation problems in different fields to bring out strengths and weaknesses of the existing algorithms as well as to point out future directions for the upcoming studies in the domain. …”
Get full text
Get full text
Article -
2
Task offloading paradigm in mobile edge computing-current issues, adopted approaches, and future directions
Published 2023“…Major offloading-related issues in MEC are investigated, and the taxonomy of journal papers based on adopted approaches is presented. For further future exploration, we suggest the potential areas of research, the contribution of the algorithms and technique, and the research direction in MEC. …”
Get full text
Get full text
Article -
3
-
4
A review of assembly line balancing optimisation with energy consideration using meta-heuristic algorithms
Published 2021“…The findings from this review could assist future researchers to align their research direction with the observed trend. …”
Get full text
Get full text
Get full text
Article -
5
The optimization of technical trading strategy using genetic algorithm approach / Khairunnisa Musa
Published 2006“…Recently, the use of genetic algorithm for the optimization of technical trading strategies has been receiving a great deal of attention. …”
Get full text
Get full text
Thesis -
6
Image splicing forgery approachs: A review and future direction
Published 2022“…This paper examines various approaches to image splicing forgery, discusses the weakness of methods, analyse the existing methods, and discusses the current solution to solve those issues, and future direction. This paper presents existing datasets, pre-processing techniques, feature extraction techniques, and classification algorithms that have been used in image splicing. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Optimization of Assembly Sequence Planning Using Soft Computing Approaches: A Review
Published 2019“…This review focused on ASP modeling approach, optimization algorithms and optimization objectives. Based on the conducted review, several future research directions were drawn. …”
Get full text
Get full text
Get full text
Article -
8
Review of Multi-Objective Swarm Intelligence Optimization Algorithms
Published 2021“…Furthermore, it describes the advantages and disadvantages of each MOO approach and provides some possible future research directions in this area. The results show that several MOO approaches have not been used in most of the proposed MOSI algorithms. …”
Get full text
Get full text
Article -
9
Bio-inspired computation: Recent development on the modifications of the cuckoo search algorithm
Published 2017“…Presently, the Cuckoo Search algorithm is attracting unprecedented attention from the research community and applications of the algorithm are expected to increase in number rapidly in the future. …”
Get full text
Get full text
Get full text
Get full text
Article -
10
-
11
Overview of Evolutionary Algorithms and Neural Networks for Modern Mobile Communication
Published 2024journal::journal article -
12
Speed control of wheeled mobile robot by nature-inspired social spider algorithm-based PID controller
Published 2023“…Robot speed may vary by changing the direction of the vehicle, so to avoid this the Social Spider Optimization (SSO) algorithm is used in PID controllers. …”
Get full text
Get full text
Get full text
Get full text
Article -
13
Adopting search-based algorithms for pairwise testing
Published 2015“…Recently, many existing work are focusing on the use of SearchBased algorithms as the basis of the implementation algorithm. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Identification of microcalcification in mammographic images / Noor Azliza Abdul Shauti
Published 2008“…From the result showed that image enhancement is to give a good and better image after ehnace.For future direction, this enhancement can be use to improve a quality of image and in image processing field especially in identify of microcalcification in future.…”
Get full text
Get full text
Thesis -
15
-
16
Chain code algorithm in deriving T-Junction and region of a freehand sketch
Published 2004“…Two factors determine the success of the algorithm. The first factor is the direction of traverses either clockwise or anti-clockwise. …”
Get full text
Get full text
Get full text
Article -
17
Parallel genetic algorithms for shortest path routing in high- performance computing / Mohd Erman Safawie Che Ibrahim
Published 2012“…This project focuses on step-up cluster computing and a parallel Genetic Algorithm. The objectives of this project to set-up Beowulf cluster computer to apply the Travelling Salesman Problem in parallel by using Genetic Algorithms and evaluate sequential algorithms and parallel algorithms by Genetic Algorithms. …”
Get full text
Get full text
Thesis -
18
Model predictive control of vaporizer in vinyl acetate monomer process
Published 2008“…In direct comparison, we show that MPC algorithm would give better performance due to future prediction potential compare to conventional controller that is PI. …”
Get full text
Get full text
Undergraduates Project Papers -
19
The use of hyperspectral remote sensing systems in precision agriculture: current status and future trends
Published 2016“…This overview will cover the current status and the future directions in the use of hyperspectral remote sensing technology in precision agriculture.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
A Review on Attack Graph Analysis for IoT Vulnerability Assessment: Challenges, Open Issues, and Future Directions
Published 2024“…As a reference source, it serves to inform academicians and practitioners interested in leveraging attack graphs for IoT network vulnerability assessment and guides future research directions in this area. � 2013 IEEE.…”
Review
