Search Results - evolution ((((evaluation techniques) OR (validation technique))) OR (computing techniques))
Search alternatives:
- evaluation techniques »
- validation technique »
- computing techniques »
-
1
Decomposition–based multi-objective differential evolution for extractive multi-document automatic text summarization
Published 2024“…However, the current approach faces a significant hurdle due to the computational intensity of the process, particularly when employing complex optimization techniques like swarm intelligence optimization alongside a costly ATS repair operator. …”
Get full text
Get full text
Article -
2
Optimization of extractive Automatic Text Summarization using Decomposition-based Multi-objective Differential Evolution and parallelization
Published 2024“…The current approach encounters a significant hurdle due to the long execution time, especially when employing complex optimization techniques alongside a computationally expensive ATS repair operator that repairs multiple candidate solutions. …”
Get full text
Get full text
Get full text
Thesis -
3
Cloudlet deployment and task offloading in mobile edge computing using variable-length whale and differential evolution optimization and analytical hierarchical process for decisio...
Published 2023“…Mobile edge computing (MEC) is a well-known technique to support delay-sensitive applications at the edge of mobile networks. …”
Get full text
Get full text
Thesis -
4
-
5
Mobile Application: Mobile Assistance for Visually Impaired People - Speech Interface System (SIS)
Published 2023Conference Paper -
6
Computational intelligence based approach for enhanced distance relay design
Published 2024text::Final Year Project -
7
A gamified augmented reality application for human-machine interaction in CNC milling machine
Published 2022“…Human-machine interaction (HMI) is an interaction and communication between human and a machine, a dynamic technical system and it is the methodology for evaluation of user interface techniques. The objectives of this research are to measure the ability of beginners, and empowering the CNC milling machine operation. …”
Get full text
Get full text
Get full text
Thesis -
8
Modelling techniques for delamination and fracture of composites
Published 2017“…The results are validated against data from the literature showing the robustness and accurateness of the techniques presented.…”
Get full text
Get full text
Proceeding Paper -
9
CSC577 - Software Engineering: Theories and Principles / College of Computing, Informatics and Media
Published 2022“…This course introduces the theories and practices of Software Engineering, which includes software processes, requirement analysis, design, programming practices, verification and validation and software evolution for a large system. …”
Get full text
Get full text
Get full text
Teaching Resource -
10
CSC577: Software Engineering: theories and principles / College of Computing, Informatics and Mathematics
Published 2018“…This course introduces the theories and practices of Software Engineering, which includes software processes, requirement analysis, design, programming practices, verification and validation and software evolution for a large system. …”
Get full text
Get full text
Get full text
Teaching Resource -
11
A wireless precoding technique for millimetre-wave MIMO system based on SIC-MMSE
Published 2019“…To maintain sequentially encoded user data connectivity and to overcome data loss, SIC method is used in combination with MMSE. MATLAB was used to validate the proposed system performance.…”
Get full text
Get full text
Get full text
Get full text
Article -
12
Two level Differential Evolution algorithms for ARMA parameters estimatio
Published 2013“…The results of both examples show the effectiveness of the proposed algorithm over a well known conventional technique.…”
Get full text
Get full text
Get full text
Proceeding Paper -
13
Sistem penilaian kenaikan pangkat pensyarah secara sistemetik berasaskan sistem bantuan keputusan berkumpulan
Published 2006“…The evolution prototype approach and UML modeling technique have been applied as the development methodologies to build the new system. …”
Get full text
Get full text
Thesis -
14
Critical review of object detection techniques for traffic light detection in intelligent transportation systems
Published 2025“…This study provides a critical review of object detection techniques specifically for traffic light detection, evaluating the evolution of machine learning frameworks, deep learning architectures, and hybrid optimization models. …”
Get full text
Get full text
Get full text
Article -
15
-
16
Metric-based code smell detection technique for python software
Published 2018“…In the second phase, details of conceptual and architectural design of the metric-based technique are presented. Thirdly, PySTect technique is implemented and evaluated in three experiments. …”
Get full text
Get full text
Thesis -
17
PMT : opposition based learning technique for enhancing metaheuristic algorithms performance
Published 2020“…Addressing these OBL limitations, this research proposes a new general OBL technique inspired by a natural phenomenon of parallel mirrors systems called the Parallel Mirrors Technique (PMT). …”
Get full text
Get full text
Thesis -
18
-
19
A New Hybrid K-Means Evolving Spiking Neural Network Model Based on Differential Evolution
Published 2018“…Clustering is one of the essential unsupervised learning techniques in Data Mining. In this paper, a new hybrid (K-DESNN) approach to combine differential evolution and K-means evolving spiking neural network model (K-means ESNN) for clustering problems has been proposed. …”
Get full text
Get full text
Get full text
Book Chapter -
20
Accelerator-based human activity recognition using voting technique with NBTree and MLP classifiers
Published 2023“…To evaluate the proposed voting technique, the performance of selected individual classifiers and existing voting technique was first examined, followed by the experiment to determine the performance of the proposed model. …”
Article
