Search Results - (( (variable OR variables) evaluation method algorithm ) OR ( java application server algorithm ))

Refine Results
  1. 1
  2. 2

    Variable block based motion estimation using hexagon diamond full search algorithm (HDFSA) via block subtraction technique by Hardev Singh, Jitvinder Dev Singh

    Published 2015
    “…There are many types of motion estimation method but the most used method is the block matching method which is the fixed block matching and the variable block matching. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    The performance of Taguchi�s T-method with binary bat algorithm based on great value priority binarization for prediction by Marlan Z.M., Ramlie F., Jamaludin K.R., Harudin N.

    Published 2023
    “…In enhancing prediction accuracy, the T-method employed Taguchi�s orthogonal array as a variable selection approach to determine a subset of independent variables that are significant toward the dependent variable or output. …”
    Article
  4. 4

    Network game (Literati) / Chung Mei Kuen by Chung, Mei Kuen

    Published 2003
    “…Java applet is a well-known and widely used example of mobile code (a variation on the traditional client-server model). …”
    Get full text
    Get full text
    Thesis
  5. 5

    Variable order step size method for solving orbital problems with periodic solutions by Rasedee, A. F. N., Jamaludin, N. A., Najib, N., Abdul Sathar, Mohammad Hasan, Wong, Tze Jin, Koo, Lee Feng

    Published 2022
    “…The efficiency of the proposed method is substantiated by the graphical representation of accuracy at the total evaluation steps.…”
    Get full text
    Get full text
    Article
  6. 6

    Diagonal R-point variable step variable order block method for solving second order ordinary differential equations by Zainuddin, Nooraini

    Published 2016
    “…Further implementation of the 2DBBDF and 3DBBDF methods in variable step variable order scheme displays comparable results with other variable step variable order methods. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8
  9. 9

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Computer remote monitoring via mobile phones using socket programming / Samih Omer Fadlelmola Elkhider by Omer Fadlelmola Elkhider, Samih

    Published 2011
    “…The studies show beyond technical algorithms, physical aspects plays a big rule in client server model. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Bayesian logistic regression model on risk factors of type 2 diabetes mellitus by Chiaka, Emenyonu Sandra

    Published 2016
    “…The significant variables determined by maximum likelihood method were then estimated using the BLR method. …”
    Get full text
    Get full text
    Thesis
  12. 12

    A firefly algorithm based hybrid method for structural topology optimization by Gebremedhen, H.S., Woldemichael, D.E., Hashim, F.M.

    Published 2020
    “…In this paper, a firefly algorithm based hybrid algorithm through retaining global convergence of firefly algorithm and ability to generate connected topologies of optimality criteria (OC) method is proposed as an alternative method to solve stress-based topology optimization problems. …”
    Get full text
    Get full text
    Article
  13. 13

    Deterministic Mutation-Based Algorithm for Model Structure Selection in Discrete-Time System Identification by Abd Samad, Md Fahmi

    Published 2011
    “…System identification is a method of determining a mathematical relation between variables and terms of a process based on observed input-output data. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14
  15. 15

    Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework by Asaad Aref, Ibrahim

    Published 2004
    “…A design proposal was outlined to provide an adaptive client/server approach to stream audio contents using Real-Time Transport Protocol (RTP) involving architecture based on the Java Media Framework (JMF) Application Programmable Interfaces (API).RTP protocol is the Internet-standard protocol for the transport of real-time data, including audio and video and can be implemented by using Java Media Framework (JMF). …”
    Get full text
    Get full text
    Thesis
  16. 16

    Comparing three methods of handling multicollinearity using simulation approach by Adnan, Norliza

    Published 2006
    “…The algorithm is described and for the purpose of comparing the three methods, simulated data sets where the number of cases was less than the number of observations were used. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Modeling forest fires risk using spatial decision tree by Yaakob, Razali, Mustapha, Norwati, Nuruddin, Ahmad Ainuddin, Sitanggang, Imas Sukaesih

    Published 2011
    “…In addition, criteria evaluation and weighting method are most applied to evaluate the small problem containing few criteria. …”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18
  19. 19

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…On the basis of the results of this research, it can be concluded that the developed prototype had high accuracy and security when transferring the file between the sender and receiver that was implemented in client-server application. This research hopes to give a clear idea to the readers about ABS algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  20. 20

    A MODIFIED PARTICLE SWARM OPTIMIZATION ALGORITHM FOR WELLBORE TRAJECTORY DESIGN by BISWAS, KALLOL

    Published 2021
    “…A lot of modifications to the original metaheuristic methods were made during previous applications, which primarily improve the exploration capability of original algorithms keeping exploitation capability unaddressed. …”
    Get full text
    Get full text
    Thesis