Search Results - (( re evaluation ((case algorithm) OR (bat algorithm)) ) OR ( based information based algorithm ))
Search alternatives:
- based information »
- information based »
- case algorithm »
- re evaluation »
- bat algorithm »
-
1
Evolutionary cost-cognizant regression test case prioritization for object-oriented programs
Published 2019“…Afterward evolutionary algorithm (EA) was employed to prioritize test cases based on the rate severity of fault detection per unit test cost. …”
Get full text
Get full text
Thesis -
2
Optimization Of Fuzzy Logic Controllers With Genetic Algorithm For Two-Part-Type And Re-Entrant Production Systems
Published 2008“…GDF and GSF controllers are evaluated for two test cases namely “two-part-type production line” and “re-entrant production system”. …”
Get full text
Get full text
Thesis -
3
Sustainable renewable energy resources utilization in rural areas
Published 2016“…Results obtained from the transportation model have been validated based on other RE studies in the area. For the similar case study considered, it is noted that the minimized total cost obtained using transportation algorithm depicts an improvement in cost over integrated renewable energy system (IRES) models. …”
Get full text
Get full text
Article -
4
Sustainable renewable energy resources utilization in rural areas
Published 2016“…Results obtained from the transportation model have been validated based on other RE studies in the area. For the similar case study considered, it is noted that the minimized total cost obtained using transportation algorithm depicts an improvement in cost over integrated renewable energy system (IRES) models. …”
Get full text
Get full text
Article -
5
Software regression test case prioritization for object-oriented programs using genetic algorithm with reduced-fitness severity
Published 2015“…One of the most important activities in software maintenance is Regression testing. The re-execution of all test cases during the regression testing is costly. …”
Get full text
Get full text
Conference or Workshop Item -
6
A regression test case selection and prioritization for object-oriented programs using dependency graph and genetic algorithm
Published 2014“…Regression testing is very important activity in software testing. The re-execution of all test cases during regression testing will be costly. …”
Get full text
Get full text
Get full text
Article -
7
Deep learning in public health: Comparative predictive models for COVID-19 case forecasting
Published 2024“…The findings indicate that the selected deep learning algorithms were proficient in forecasting COVID-19 cases, although their efficacy varied across different models. …”
Get full text
Get full text
Get full text
Article -
8
A review on the graphical user authentication algorithm : recognition-based and recall-based.
Published 2013“…User authentication has become an important consideration in information security as traditional password-based schemes are constantly subjected to attacks. …”
Get full text
Get full text
Article -
9
An indoor based push notification for location-based marketing using bluetooth smart ready technology / Nur Farehah Alias
Published 2017“…Therefore, this project has proposed a method called token based alert notification. There are three algorithm developed for token based alert notification which is tokenization algorithm, token matching algorithm and item identification algorithm. …”
Get full text
Get full text
Thesis -
10
Agent-based extraction algorithm for computational problem solving
Published 2015“…The results show that the extraction algorithm has been able to extract 100 % of the information correctly. …”
Get full text
Get full text
Thesis -
11
MGR: An Information Theory Based Hierarchical Divisive Clustering Algorithm for Categorical Data
Published 2014“…This research proposes mean gain ratio (MGR), a new information theory based hierarchical divisive clustering algorithm for categorical data. …”
Get full text
Get full text
Get full text
Article -
12
Location based services of nearest petrol station using asymmetric key algorithm / Muhammad Awwab Mohd Amdan
Published 2014“…El-gamal encryption system is an asymmetric key encryption algorithm which is based on the Diffie-Hellman key exchange. …”
Get full text
Get full text
Thesis -
13
Adaptive intelligence job online scheduling within dynamic grid environment based on gridsim
Published 2008“…Additionally, the provided common information from Grid Information Service (GIS) and an arrival new job are calculated by Fuzzy C-Means (FCM) algorithm in order· to evaluate the current status of resources and groups of arrival jobs. …”
Get full text
Get full text
Article -
14
Development of an augmented reality based facility layout planning and optimization / Tan Chee Hau
Published 2020“…Four cases studies have investigated this research whereby case study-1 is to evaluate the most suitable position and orientation of a new machine to be placed in an existing production floor, case study-2 is to maximize the area given and further maximize the productivity by optimizing the production sequence, case study-3 is about identifying the best position of a shared facility whereas the case study-4 identified the most effective production sequence in a robotic conveyor cell. …”
Get full text
Get full text
Get full text
Thesis -
15
-
16
-
17
A new algorithm on Graphical User Authentication (GUA) based on multi-line grids
Published 2010“…Thereafter a comparative analysis of all Recall-Based algorithms based on attack patterns of graphical user authentication is tabulated. …”
Get full text
Get full text
Get full text
Article -
18
An adaptive density-based method for clustering evolving data streams / Amineh Amini
Published 2014“…This study proposes a density-based algorithm for clustering evolving data streams. …”
Get full text
Get full text
Get full text
Thesis -
19
Chaotic-based encryption algorithm using henon and logistic maps for fingerprint template protection
Published 2020“…The chaotic-based encryption algorithms have been improved a lot in terms of their robustness. …”
Get full text
Get full text
Get full text
Article -
20
Algorithms for extracting adjacency matrix based on Formal Concept Analysis (FCA)
Published 2017“…The desire to achieve a holistic representation of Information Retrieval (IR) with the aim for a human-oriented form of representation has spurred the growth of concept-based IR search techniques such as the Semantic Web technology. …”
Get full text
Get full text
Conference or Workshop Item
