Search Results - (( basic validating _ algorithm ) OR ( java implication based algorithm ))
Search alternatives:
-
1
Landslide susceptibility mapping at VAZ watershed (Iran) using an artificial neural network model: a comparison between multilayer perceptron (MLP) and radial basic function (RBF)...
Published 2013“…The main objective of this study was to investigate and compare the results of two artificial neural network (ANN) algorithms, i.e., multilayer perceptron (MLP) and radial basic function (RBF) for spatial prediction of landslide susceptibility in Vaz Watershed, Iran. …”
Get full text
Get full text
Article -
2
-
3
System identification using Extended Kalman Filter
Published 2017“…In order to evaluate the performance of the EKF learning algorithm, the proposed algorithm validation were analyzed using model validation methods as a checker such as One Step Ahead (OSA) and correlation coefficient (R2). …”
Get full text
Get full text
Student Project -
4
-
5
Optimal power flow based on fuzzy linear programming and modified Jaya algorithms
Published 2017“…Two versions of the Jaya algorithm namely, the basic Jaya algorithm and novel quasi-oppositional Jaya (QOJaya) algorithm are proposed to solve different single objective OPF problems. …”
Get full text
Get full text
Thesis -
6
An experimental validation and optimisation tool path strategy for thin walled structure
Published 2011“…The target was to develop models which mimic the actual cutting process using the finite element method (FEM), to validate the developed tool path strategy algorithm with the actual machining process and to programme the developed algorithm into the software. …”
Get full text
Get full text
Get full text
Article -
7
-
8
Development of automated neighborhood pattern sensitive faults syndrome generator for static random access memory
Published 2011“…A user-friendly Graphical User Interface (GUI) is developed using Microsoft Visual Basic software to load and display the algorithm under test and display the result. …”
Get full text
Get full text
Thesis -
9
-
10
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
11
Multiple Objective Optimization of Green Logistics Using Cuckoo Searching Algorithm
Published 2016“…Basically, Cuckoo searching algorithm imitates the natural evolution of a population with initial solutions. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Fuzzy adaptive teaching learning-based optimization for solving unconstrained numerical optimization problems
Published 2022“…The performance of the fuzzy adaptive teaching learning-based optimization is evaluated against other metaheuristic algorithms including basic teaching learning-based optimization on 23 unconstrained global test functions. …”
Get full text
Get full text
Get full text
Article -
13
A novel quasi-oppositional modified Jaya algorithm for multi-objective optimal power flow solution
Published 2018“…Significant modifications to the basic Jaya algorithm are done to create a modified Jaya (MJaya) algorithm that can handle the MOOPF problem. …”
Get full text
Get full text
Get full text
Article -
14
Design of nonlinear adaptive interaction algorithm controller for improvement of tracking performance of X-Y table ball screw drive system
Published 2023“…The contribution is Nonlinear Adaptive Interaction Algorithm (NAIA). The controller is developed based on the enhancement and modification of the basic Adaptive Interaction Algorithm Controller (AIA). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
15
BMTutor research design: Malay sentence parse tree visualization
Published 2014“…This paper discusses the research design for BMTutor.BMTutor is a prototype for visualizing Malay sentences that is combined with sentence checker, sentence correction and word attribute components.The purpose of BMTutor is to check sentence validation, provide sentence correction for invalid sentence used and produce parse tree visualization.The research design involved can be divided into four phases; categorizing sentence and produce repository (Phase1), developing models and algorithms (Phase 2); development of a prototype (Phase 3); and prototype testing (Phase 4).To date, this system is the only one designed with the functions and characteristics as in BMTutor.There are two BM parsers to check the validity of simple BM sentences had been developed.Both parsers performed three phases in research design, namely 1) the collection of sentence or CFG, 2) develop a prototype, and 3) conduct evaluation.The phases involved are the basic method in developing a prototype. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Develpoment of combinatorial optimisation for cutting tool path strategy
Published 2009“…The target was to develop models which mimic the actual cutting process using the Finite Element Method (FEM) and to validate the developed tool path strategy algorithm with the actual machining process and to programmer the developed algorithm into software. …”
Get full text
Get full text
Conference or Workshop Item -
17
Developing a prototype e-commerce application with credit card validation and secure transaction
Published 2005“…The application also includes an online credit card validation module that validates credit cards against the Luhn Algorithm and predefined credit card prefixes.The application will accept three types of credit cards which are Mastercard,Visa and American Express.The application is developed on the NET platform using ASP.NET and Visual Basic NET scripting.Therefore,the application could run on all kinds of platform.The application requires a Microsoft Server based operating system and Microsoft SQL Server in order for it to run.The application has been tested and runs successfully both on a server and on a workstation with server settings.In short,this system is the solution to the problems of current e-commerce technology.…”
Get full text
Get full text
Undergraduates Project Papers -
18
Enhanced Handover Algorithm for Quality of Service Maintenance in an Extended Service Set Wi-Fi Network
Published 2025“…In this thesis, the study focuses on the performance of the enhanced roaming algorithm in Extended Service Set (ESS) network, which consists of multiple Basic Service Set (BSS) network. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
19
Investigating and developing the best method in shortest path for implementing a geographical information system (e-map) for Peninsular Malaysia
Published 2005“…A development of GIS database is also involved in prototype covering the road network in Peninsular Malaysia (the e-map) will be developed to show the viability or validity of the findings. The system will be developed by using Microsoft Visual Basic and some supporting software. …”
Get full text
Get full text
Monograph -
20
A hybrid particle swarm optimization - extreme learning machine approach for intrusion detection system
Published 2018“…Our propose model has been apple based as intrusion detection and validated based on NSL-KDD data set. Our developed model has been compared against a basic ELM. …”
Get full text
Get full text
Get full text
Conference or Workshop Item
