Search Results - (evolution OR solution) ((validation technique) OR (computing techniques))
Search alternatives:
- validation technique »
- computing techniques »
-
1
Decomposition–based multi-objective differential evolution for extractive multi-document automatic text summarization
Published 2024“…In order to address this, a novel solution called Decomposition-based Multi-Objective Differential Evolution (MODE/D) is proposed. …”
Get full text
Get full text
Article -
2
Cloudlet deployment and task offloading in mobile edge computing using variable-length whale and differential evolution optimization and analytical hierarchical process for decisio...
Published 2023“…Mobile edge computing (MEC) is a well-known technique to support delay-sensitive applications at the edge of mobile networks. …”
Get full text
Get full text
Thesis -
3
-
4
Optimization of extractive Automatic Text Summarization using Decomposition-based Multi-objective Differential Evolution and parallelization
Published 2024“…The current approach encounters a significant hurdle due to the long execution time, especially when employing complex optimization techniques alongside a computationally expensive ATS repair operator that repairs multiple candidate solutions. …”
Get full text
Get full text
Get full text
Thesis -
5
Hybrid Harmony Search Algorithm Integrating Differential Evolution and Lévy Flight for Engineering Optimization
Published 2025“…This paper proposes HSA-DELF, a novel hybrid algorithm that combines differential evolution (DE) and Lévy flight (LF) techniques to enhance the performance of HSA. …”
Get full text
Get full text
Get full text
Article -
6
Hybrid harmony search algorithm integrating differential evolution and lévy flight for engineering optimization
Published 2025“…This paper proposes HSA-DELF, a novel hybrid algorithm that combines differential evolution (DE) and Lévy flight (LF) techniques to enhance the performance of HSA. …”
Get full text
Get full text
Get full text
Article -
7
Application of Gas-Kinetic BGK Scheme for Solving 2-D Compressible Inviscid Flow around Linear Turbine Cascade
Published 2006“…BGK scheme is an approximate Riemann solver that uses the collisional Boltzmann equation as the governing equation for flow evolutions. For efficient computations, particle distribution functions in the general solution of the BGK model are simplified and used for the flow simulations. …”
Get full text
Get full text
Article -
8
Selective harmonic elimination in cascaded H-bridge multilevel inverter using hybrid APSO algorithm / Mudasir Ahmed
Published 2019“…Regardless of many benefits of BIAs, the issues like local minima, less precision, slow convergence rate, and computational complexity are the core optimization problems which required some serious consideration to acquire the maximum benefit from the SHEPWM technique. …”
Get full text
Get full text
Get full text
Thesis -
9
A computational algorithm for the numerical solution of nonlinear fractional integral equations
Published 2021“…To check the validation and convergence of the proposed technique, some exam-ples are given. …”
Get full text
Get full text
Article -
10
A COMPUTATIONAL ALGORITHM for the NUMERICAL SOLUTION of NONLINEAR FRACTIONAL INTEGRAL EQUATIONS
Published 2022“…To check the validation and convergence of the proposed technique, some examples are given. …”
Get full text
Get full text
Article -
11
Modelling techniques for delamination and fracture of composites
Published 2017“…The results are validated against data from the literature showing the robustness and accurateness of the techniques presented.…”
Get full text
Get full text
Proceeding Paper -
12
CSC577 - Software Engineering: Theories and Principles / College of Computing, Informatics and Media
Published 2022“…This course introduces the theories and practices of Software Engineering, which includes software processes, requirement analysis, design, programming practices, verification and validation and software evolution for a large system. …”
Get full text
Get full text
Get full text
Teaching Resource -
13
CSC577: Software Engineering: theories and principles / College of Computing, Informatics and Mathematics
Published 2018“…This course introduces the theories and practices of Software Engineering, which includes software processes, requirement analysis, design, programming practices, verification and validation and software evolution for a large system. …”
Get full text
Get full text
Get full text
Teaching Resource -
14
A wireless precoding technique for millimetre-wave MIMO system based on SIC-MMSE
Published 2019“…To maintain sequentially encoded user data connectivity and to overcome data loss, SIC method is used in combination with MMSE. MATLAB was used to validate the proposed system performance.…”
Get full text
Get full text
Get full text
Get full text
Article -
15
Discrete Evolutionary Programming for Network Splitting Strategy: Different Mutation Technique
Published 2018“…The techniques are validated using the IEEE 30 and IEEE 118-bus system. …”
Get full text
Get full text
Article -
16
-
17
Computational model of stepwise quantitative assessment of equations correctness / Nuru'l - 'Izzah Othman
Published 2015“…Hence, the underlying computational techniques of the model can be regarded as correct. …”
Get full text
Get full text
Thesis -
18
A lightweight framework for intensive mobile application processing in mobile cloud computing / Muhammad Shiraz
Published 2013“…Therefore, lightweight techniques are imperative for the processing of computational intensive applications in MCC. …”
Get full text
Get full text
Thesis -
19
Three dimensional craniofacial anthropometry using stereophotogrammetry: validation of the technique
Published 2005Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Analytical approximation of solitary waves with compact support for fractional nonlinear dispersive k(m,n) equations
“…Graphical representations illustrate the precision and reliability of the technique. The results confirm that the MMRDTM can achieve better approximations to exact solutions efficiently.…”
Get full text
Get full text
Article
