Search Results - (( changes evaluation _ algorithm ) OR ( java application during algorithm ))

Refine Results
  1. 1

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  2. 2

    SUDOKU HELPER by Abdul Razak, Muhammad Asyraf

    Published 2015
    “…In this paper research, author presents an algorithm to provide a tutorial for any Sudoku player who got stuck during the solving process. …”
    Get full text
    Get full text
    Final Year Project
  3. 3

    Performance evaluation of marker recognition algorithm for mobile augmented reality in the real environment by Siok, Yee Tan, Haslina Arshad

    Published 2023
    “…The AR algorithm can obtain an accuracy of 83.49%, 70.89%, and 72.78% in terms of brightness changes, scale changes, and rotation changes respectively. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4
  5. 5

    Evaluating power efficient algorithms for efficiency and carbon emissions in cloud data centers: a review by Uddin, Mueen, Darabidarabkhani, Yasaman, Shah, Asadullah, Memon, Jamshed

    Published 2015
    “…The three algorithms are evaluated for performance using three parameters; power efficiency, cost effectiveness, and amount of CO2 emissions. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Evaluation of MLP-ANN Training Algorithms for Modeling Soil Pore-Water Pressure Responses to Rainfall by Mustafa, M.R., Rezaur, R.B., Saiedi, Saied, Rahardjo, H., Isa, M.H.

    Published 2013
    “…The LM training algorithm is therefore proposed as an ideal and fast training algorithm for modeling the dynamics of soil pore-water pressure changes in response to rainfall patterns.…”
    Get full text
    Get full text
    Citation Index Journal
  7. 7

    Improved ADALINE Harmonics Extraction Algorithm for Boosting Performance of Photovoltaic Shunt Active Power Filter under Dynamic Operations by Mohd Zainuri, M.A.A., Radzi, M.A.M., Soh, A.C., Mariun, N., Rahim, N.A.

    Published 2016
    “…Steady state operation and three critical dynamic operations, which involve change of nonlinear loads, off-on operation between PV and SAPF, and change of irradiances, were carried out for performance evaluation. …”
    Get full text
    Get full text
    Article
  8. 8

    Objective and Subjective Evaluations of Adaptive Noise Cancellation Systems with Selectable Algorithms for Speech Intelligibility by Roshahliza, M. Ramli, Salina, Abdul Samad, Noor, Ali O. Abid

    Published 2018
    “…Adaptive Noise Cancellation (ANC) systems with selectable algorithms refer to ANC systems that are able to change the adaptation algorithm based on the eigenvalue spread of the noise. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  9. 9
  10. 10

    Improved ADALINE harmonics extraction algorithm for boosting performance of photovoltaic shunt active power filter under dynamic operations by Mohd Zainuri, Muhammad Ammirrul Atiqi, Mohd Radzi, Mohd Amran, Che Soh, Azura, Mariun, Norman, Abd. Rahim, Nasrudin

    Published 2016
    “…Steady state operation and three critical dynamic operations, which involve change of nonlinear loads, off-on operation between PV and SAPF, and change of irradiances, were carried out for performance evaluation. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11
  12. 12
  13. 13

    Reservoir system modelling using nondominated sorting genetic algorithm in the framework of climate change by Nurul Nadrah Aqilah, Tukimat

    Published 2014
    “…In conclusion, this finding contributes toward the development of models using evolution algorithm and statistical methods for sustainable water resources planning and management in the context of future climate change…”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Analysis and evaluation of various aspects of solar radiation in the Palestinian territories by Ismail M.S., Moghavvemi M., Mahlia T.M.I.

    Published 2023
    “…Calculations of the optimized tilt and surface azimuth angles on monthly, seasonal and yearly basis were conducted, with the genetic algorithm being used for this purpose. Different PV tracking methods were also evaluated, taking into account the annual energy production. …”
    Article
  18. 18

    Photovoltaic System with INC MPPT Algorithm in MATLAB Simulink by F.Z. Hamidon, Nor Shafiqin, P.D. Abd. Aziz, N.H. Mohd Yunus, UniKL BMI

    Published 2013
    “…The performance analysis with regards to the MPPT convergence speed and efficiency are evaluated with respect to rapid change of of irradiance level under local conditions. …”
  19. 19

    Refinement of Tuned Mass Damper parameters on machine support structure using dynamic Cuckoo Search algorithm by Ahmad Muinuddin, Mahmood, Zamri, Mohamed, Rosmazi, Rosli

    Published 2025
    “…In the dynamic CS algorithm, the value for discovery probability (pa) and the step size factor (a) are changed dynamically which changes the convergence speed to the solution. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications by Hydara, Isatou

    Published 2015
    “…This research work was limited to Java based web applications. In future research, the method can be extended to include other programming languages as well as other similar web application security vulnerabilities.…”
    Get full text
    Get full text
    Thesis