Search Results - (( developing function mead algorithm ) OR ( java solution machine algorithm ))

  • Showing 1 - 13 results of 13
Refine Results
  1. 1
  2. 2
  3. 3
  4. 4

    Network monopoly / Tan Kean Yeap by Tan , Kean Yeap

    Published 2002
    “…With the powerful networking features of Java, it is expected that this project would produce a "real" game engine. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Development of open platform controller for step-NC compliant CNC system by Chi Adam, Mohd Khairil Anbia

    Published 2020
    “…Therefore, this study covers the system which has been designed and developed from outdated and conventional PROLIGHT 1000 Milling CNC machine from Light Intelitek as the lesser cost solution which further discussed in detail based upon upgrades of hardware, architecture, and algorithm design. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Simulation of COVID-19 outbreaks via graphical user interface (GUI) by Mohd Jamil, Norazaliza, Rosli, Norhayati, Muhammad, Noryanti

    Published 2021
    “…An improved SIRD model was solved via the 4th order Runge-Kutta (RK4) method and 14 unknown parameters were estimated by using Nelder- Mead algorithm and pattern-search technique. The publicly available data for COVID-19 outbreak in Malaysia was used to validate the performance of the model. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Modelling transmission dynamics of Covid-19 during pre-vaccination period in Malaysia: a GUI-based seird predictive model using Streamlit by Norsyahidah Zulkarnain, Muhammad Salihi Abdul Hadi, Nurul Farahain Mohammad, Shogar, Ibrahim

    Published 2024
    “…The mathematical model is solved using the Scipy odeint function, which uses the Livermore Solver for Ordinary Differential Equations with an Automatic method switching (LSODA) algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Modelling transmission dynamics of covid-19 during Pre-vaccination period in Malaysia: a predictive guiseird model using streamlit by Zulkarnain, Norsyahidah, Abdul Hadi, Muhammad Salihi, Mohammad, Nurul Farahain, Shogar, Ibrahim

    Published 2023
    “…The mathematical model is solved using Scipy odeint function, which uses Livermore Solver for Ordinary Differential Equations with an Automatic method switching (LSODA) algorithm. …”
    Get full text
    Get full text
    Proceeding Paper
  9. 9

    Modelling transmission dynamics of Covid-19 during pre-vaccination period in Malaysia : a gui-based seird predictive model using streamlit by Zulkarnain, Norsyahidah, Abdul Hadi, Muhammad Salihi, Mohammad, Nurul Farahain, Shogar, Ibrahim

    Published 2024
    “…The mathematical model is solved using the Scipy odeint function, which uses the Livermore Solver for Ordinary Differential Equations with an Automatic method switching (LSODA) algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Mathematical model for predicting the performance of photovoltaic system with delayed solar irradiance by Siti Nurashiken, Md Sabudin

    Published 2023
    “…The numerical solution is obtained by adopting the Runge Kutta method coupled with a parameter fitting technique, the Nelder Mead algorithm, which is implemented by using MATLAB software. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Mathematical model for predicting the performance of photovoltaic system with delayed solar irradiance by Siti Nurashiken, Md Sabudin, Norazaliza, Mohd Jamil

    Published 2024
    “…The numerical solution is obtained by adopting the 4th-order Runge Kutta method coupled with a parameter fitting technique, the Nelder Mead algorithm, which is implemented by using MATLAB software. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    The implications for ahybrid detection technique against malicious sqlattacks on web applications by Bahjat Arif, Sarajaldeen Akram, Wani, Sharyar

    Published 2025
    “…The outcome of this study will add to the body of knowledge the most important and recent proposed solutions to mitigate SQL injection attack, in particular those based on machine learning algorithm…”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC by Ismail, Haqi Khalid

    Published 2021
    “…The offline scheme utilizes a Time-based One-Time Password (TOTP) algorithm to allow users to authenticate to the vehicle without needing an Internet connection once they have registered online when Internet access is available. …”
    Get full text
    Get full text
    Thesis