Search Results - (( developing function a algorithm ) OR ( java implementation towards algorithm ))
Search alternatives:
- implementation towards »
- developing function »
- java implementation »
- towards algorithm »
- a algorithm »
- function a »
-
1
Network monopoly / Tan Kean Yeap
Published 2002“…This thesis steps towards developing a netv orked board game, supporting multiple players. …”
Get full text
Get full text
Thesis -
2
Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter
Published 2019“…It does not consider the LACE algorithm implemented in huge number of server in one Cloud datacenter. …”
Get full text
Get full text
Thesis -
3
Network game (Literati) / Chung Mei Kuen
Published 2003“…This thesis steps towards developing a networked game, Literati game system that supporting two players at one time. …”
Get full text
Get full text
Thesis -
4
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
Get full text
Get full text
Get full text
Thesis -
5
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…The circuits have been designed by proteus, the microcontrollers have been programmed by micro C, and the Graphical User Interface (GUI) has been implemented in Java. Few by electronic components such as RFID, multiplexer, XBee, and servo motors have been used to realize the system. …”
Get full text
Get full text
Thesis -
6
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…The system is capable in operating an off-line programming method, starting from its programming sequences until robotic implementation of the program. During early stages, the research is emphasis more towards designing a robotic system using RoboLab software and C++ programming language. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
A block cipher based on genetic algorithm
Published 2016“…The development of block ciphers have resulted in a number of cryptographic algorithms such as, AES, ARIA, BLOWFISH256, DESL, 3D-AES and many more. …”
Get full text
Get full text
Get full text
Thesis -
8
-
9
Quantum-Behaved Lightning Search Algorithm to Improve Indirect Field-Oriented Fuzzy-PI Control for im Drive
Published 2023Conference Paper -
10
Computing the autopilot control algorithm using predictive functional control for unstable model
Published 2009“…This paper discusses the computing development of a control algorithm using Predictive Functional Control (PFC) for model-based that having one or more unstable poles. …”
Get full text
Get full text
Conference or Workshop Item -
11
Effort Estimation Model for Function Point Measurement
Published 2007“…Software Cost Estimation is a practical process that is applied to find out basically the effort and development time requirements for a software product, which is going to be developed. …”
Get full text
Get full text
Thesis -
12
Chebyshev approximation of discrete polynomials and splines
Published 2004“…The output of the algorithm is a set of extreme points that can be used to construct a minimal error approximation function. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
13
Chebyshev approximation of discrete polynomials and splines
Published 2004“…The output of the algorithm is a set of extreme points that can be used to construct a minimal error approximation function. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
14
A video-rate color image segmentation using adaptive and statistical membership function
Published 2010“…Typically, the image segmentation algorithms in video processing system require very high computation power, so it is desirable to develop algorithms for implementation as a real-time system. …”
Get full text
Get full text
Get full text
Article -
15
A genetic algorithm based approach for economic dispatch in power system / Mohd Rozely Kalil
Published 1998“…The Genetic Algorithm developed in the project was tested on two objective functions for optimizing the economic dispatch problem, which are the total generation cost and the incremental cost function. …”
Get full text
Get full text
Thesis -
16
A study on regional GDP forecasting analysis based on radial basis function neural network with genetic algorithm (RBFNN-GA) for Shandong economy
Published 2022“…These basic indicators can comprehensively and effectively reflect a country’s or region’s future economic development. …”
Get full text
Get full text
Article -
17
Curve Reconstruction By Metaheuristics Algorithms On Cubic Rational Bézier Function
Published 2019“…The optimisation technique consists of exact algorithm, and approximate algorithm. The approximate algorithm is a good technique to be highlighted since it is a feasible way to develop an easier, more convenient curve fitting method, that will save great computation, solve a large scale problem and produce a better quality end result. …”
Get full text
Get full text
Thesis -
18
Development and applications of metaheuristic algorithms in engineering design and structural optimization / Ali Sadollah
Published 2013“…Furthermore, a comparative study was carried out to show the effectiveness of the proposed algorithms over other well-known methods in terms of computational time (speed) and function values. …”
Get full text
Get full text
Thesis -
19
Estimation of the denitrification in the lower Mississippi Valley
Published 2001“…The CREAMS denitrification algorithm is a function of the number of days of drainage from the bottom layer of the profile. …”
Get full text
Get full text
Conference or Workshop Item -
20
Designing New Block Cipher Based On Genetic Algorithm Approach
Published 2024“…The development of block cipher have resulted in a number of cryptographic algorithms such as FOX, BC2, HIGHT, KLEIN, KAMFEE, KAMKAR, ARIA, BLOWFISH256, DESL, REBC2, DSDP, 3D-AES and many more. …”
Article
