Search Results - solution ((selection techniques) OR (computing techniques))
Search alternatives:
- selection techniques »
- computing techniques »
-
1
Successor selection for Ant Colony Optimization technique algorithm / Muhammad Iskandar Isman
Published 2017“…ACO algorithm is the best solution because it included the optimization technique to optimized the result based on the data criteria needs. …”
Get full text
Get full text
Thesis -
2
Power System Controlled Islanding Using Modified Discrete Optimization Techniques
Published 2021“…The results show that the MDEP technique produces the best optimal islanding solution compared to the MDPSO and other previously published techniques.…”
Get full text
Get full text
Get full text
Article -
3
Power System Controlled Islanding using Modified Discrete Optimization Techniques
Published 2023Article -
4
Comparison of feature selection techniques in classifying stroke documents
Published 2019“…This dataset underwent the text pre-processing that is crucial before proceed to feature selection phase. Features selection phase is involving Information Gain and Pearson Correlation technique. …”
Get full text
Get full text
Get full text
Get full text
Article -
5
Optimized Cover Selection for Audio Steganography Using Multi-Objective Evolutionary Algorithm
Published 2023“…Existing embedding techniques depend on cover audio selected by users. …”
Get full text
Get full text
Get full text
Article -
6
Design Of Perturbative Hyper-Heuristics For Combinatorial Optimisation
Published 2019“…However, exact algorithms are not feasible for solving complex problem due to its high computational overhead. Approximation algorithm is a sub-class of techniques which is able to provide sub-optimal solution(s) with reasonable computational cost. …”
Get full text
Get full text
Thesis -
7
Selective mode excitation techniques for mode-division multiplexing: A critical review
Published 2018“…This paper critically reviews and systematically classifies recent selective mode excitation techniques for mode division multiplexing. …”
Get full text
Get full text
Get full text
Article -
8
Fuzzy Analytic Hierarchy Process (FAHP) and Fuzzy technique for Order Of Preference By Similarity To Ideal Solution (TOPSIS) in selecting the best Information Technology (IT) programs based on employer perspective / Nurshafiqah Aina Shah Bani
Published 2024“…This research aims to evaluate the employer perspective in choosing the best programs in the IT field by using the Fuzzy Analytic Hierarchy Process (FAHP) and Fuzzy Technique for Order Preference by Similarity to Ideal Solution (TOPSIS). …”
Get full text
Get full text
Thesis -
9
Multi-Criteria Decision Making Using TOPSIS Method: An Application in the Selection of Future Communication Solutions for Electrical Distribution Substations
Published 2023“…Electric substations; Communication technology selection; Communicationtechnology; Electrical distribution networks; Multi criteria decision-making; Multicriteria decision-making; Multicriterion decision makings; Solution methods; Technique for order preference by similarities to ideal solutions; Technique for order preference by similarity to ideal solution method; Technology selection; Decision making…”
Conference Paper -
10
Review of adaptive cell selection techniques in LTE-advanced heterogeneous networks
Published 2016“…By contrast, a cell selection technique based on adaptive bias is a more effective solution to traffic load balancing in terms of increasing data rate compared with static bias-based approaches. …”
Get full text
Get full text
Get full text
Article -
11
-
12
A comparative performance analysis of computational intelligence techniques to solve the asymmetric travelling salesman problem
Published 2021“…These six algorithms were chosen for their performance comparison because they have posted some of the best results in literature and they employ different search schemes in attempting solutions to the ATSP. The comparative algorithms in this study employ different techniques in their search for solutions to ATSP: the African Buffalo Optimization employs the modified Karp–Steele mechanism, Model-Induced Max-Min Ant Colony Optimization (MIMM-ACO) employs the path construction with patching technique, Cooperative Genetic Ant System uses natural selection and ordering; Randomized Insertion Algorithm uses the random insertion approach, and the Improved Extremal Optimization uses the grid search strategy. …”
Get full text
Get full text
Get full text
Article -
13
-
14
Discrete Evolutionary Programming for Network Splitting Strategy: Different Mutation Technique
Published 2018“…The results show that three-level mutation technique produces better optimal splitting solution as compared to single mutation technique.…”
Get full text
Get full text
Article -
15
Systematic review of intrusion detection system based on machine learning techniques for internet of things
Published 2023“…We highlighted the most efficient machine learning algorithms and feature selection techniques, along with strategies to address issues related to dataset imbalance in benchmarked datasets, with the goal of fostering the development of robust IDS solutions for IoT security.…”
Get full text
Get full text
Article -
16
-
17
An advanced scheme based on Artificial Intelligence technique for solving nonlinear Riccati systems
Published 2024“…A vectorization algorithm is designated for the selected step to make the computation process more efficient. …”
Get full text
Get full text
Article -
18
Initialization procedure in solving Optimal Power Flow (OPF) using Artificial Immune System (AIS) optimization technique / Aimi Idzwan Tajudin
Published 2007“…This project report presents a solution for initializing optimal power flow by using artificial immune system optimization technique. …”
Get full text
Get full text
Thesis -
19
Hybrid Requirements Prioritization System Using Cumulative Voting (Cv) And Planning Game (Pg) To Prioritize Requirements In Software Development Project (Cvpg - Priosys)
Published 2023“…Plus, it is noticeable that there is no technique that excels in every possible scenario. Some techniques may fit well but may not fit for other factors. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
20
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…But the large number of available prevention techniques make the selection of the best solution a big challenge, because not every technique fit all types of web application, hence a one technique for all is another issue and a difficult task. …”
Get full text
Get full text
Get full text
Article
