Search Results - (( based optimization mead algorithm ) OR ( java application model algorithm ))

Refine Results
  1. 1

    A Novel Polytope Algorithm based on Nelder-mead method for localization in wireless sensor network by Gumaida, Bassam, Abubakar, Adamu

    Published 2024
    “…Results: Simulation results perfectly showed that the suggested localization algorithm based on NMM can carry out a better performance than that of other localization algorithms utilizing other op- timization approaches, including a particle swarm optimization, ant colony (ACO) and bat algorithm (BA). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Optimized PID controller of DC-DC buck converter based on archimedes optimization algorithm by Ling, Kuok Fong, Islam, Muhammad Shafiqul, Mohd Ashraf, Ahmad

    Published 2023
    “…The proposed PID controller, optimized using AOA, is contrasted with PID controllers tuned via alternative algorithms including the hybrid Nelder-Mead method (AEONM), artificial ecosystem-based optimization (AEO), differential evolution (DE), and particle swarm optimizer (PSO). …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3
  4. 4

    Single and Multiple variables control using Tree Physiology Optimization by Halim, A.H., Ismail, I.

    Published 2017
    “…The proposed algorithm is also compared with deterministic gradient-free algorithm: Nelder-Mead simplex (NMS) and another metaheuristic algorithm: Particle Swarm Optimization (PSO). …”
    Get full text
    Get full text
    Article
  5. 5
  6. 6
  7. 7
  8. 8

    Real-time algorithmic music composition application. by Yap, Alisa Yi Hui

    Published 2022
    “…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  9. 9
  10. 10
  11. 11
  12. 12

    A Toolkit for Simulation of Desktop Grid Environment by FOROUSHAN, PAYAM CHINI

    Published 2014
    “…In this type of environment it is nearly impossible to prove the effectiveness of a scheduling algorithm. Hence the main objective of this study is to develop a desktop grid simulator toolkit for measuring and modeling scheduler algorithm performance. …”
    Get full text
    Get full text
    Final Year Project
  13. 13

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…The objective of this study is to enhance the confidentiality and security of the image steganography application by combining cryptography algorithm. In this proposed model, the RSA algorithm is used to encrypt a secret message into an unreadable ciphertext before hiding it in the image. …”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment by Ruzita, Ahmad

    Published 2013
    “…This thesis describes original research in the field of software quality model by presenting a Feature Ranking Algorithm (FRA) for Pragmatic Quality Factor (PQF) model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    Network game (Literati) / Chung Mei Kuen by Chung, Mei Kuen

    Published 2003
    “…Therefore, efficient and robust servers that process separate client connections in separate threads are needed. Java applet is a well-known and widely used example of mobile code (a variation on the traditional client-server model). …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18
  19. 19

    Factor Strategy Model: Proofs of Prototype Concept for Software Quality Evaluation by Nathan, Darmawan, Ooi, Keng Boon, Chong, Alain Yee Loong, Tan, Boon In

    Published 2010
    “…Thus, by providing an algorithm analyzer to analyze the quality of design of the software product, developers or students can identify possible bad software design in their application.…”
    Get full text
    Get full text
    Article
  20. 20