Search Results - (( evolution identification system algorithm ) OR ( java implementation models algorithm ))
Search alternatives:
- evolution identification »
- identification system »
- implementation models »
- java implementation »
- system algorithm »
- models algorithm »
-
1
Voltage stability margin identification using evolution programming learning algorithm / Zamzuhairi Darus
Published 2003“…Voltage stability problems have been one of the major concerns for electric utilities as a result of a system heavy loading. This project proposed on an investigation on the voltage stability margin identification using evolution programming learning algorithm. …”
Get full text
Get full text
Thesis -
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
3
Hybrid algorithm for NARX network parameters' determination using differential evolution and genetic algorithm
Published 2013“…The performance of the algorithm is evaluated on identification of a laboratory rotary motion system. …”
Get full text
Get full text
Get full text
Article -
4
-
5
Nonlinear identification of a small scale unmanned helicopter using optimized NARX network with multiobjective differential evolution
Published 2014“…This study proposes a hybrid of conventional back propagation training algorithm for the NARX network and multiobjective differential evolution (MODE) algorithm for identification of a nonlinear model of an unmanned small scale helicopter from experimental flight data.The proposed hybrid algorithm was able to produce models with Pareto-optimal compromise between the design objectives. …”
Get full text
Get full text
Get full text
Article -
6
Hybrid DE-PEM algorithm for identification of UAV helicopter
Published 2014“…Originality/value – This study presents a novel hybrid algorithm for system identification of an autonomous helicopter model.…”
Get full text
Get full text
Get full text
Article -
7
Provider independent cryptographic tools
Published 2003“…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
Get full text
Get full text
Get full text
Monograph -
8
Autotuning PID Controllers for Quadplane Hybrid UAV using Differential Evolution Algorithm
Published 2024“…The paper presents a method for autotuning attitude PID for a quadplane UAV using differential evolution (DE), X-Plane simulation, and neural network (NN)-based system identification. …”
Get full text
Get full text
Get full text
Article -
9
Autotuning PID Controllers for Quadplane Hybrid UAV using Differential Evolution Algorithm
Published 2024“…The paper presents a method for autotuning attitude PID for a quadplane UAV using differential evolution (DE), X-Plane simulation, and neural network (NN)-based system identification. …”
Get full text
Get full text
Get full text
Article -
10
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
11
-
12
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013“…The performance of Java programming model and native programming model are compared with respect to the execution time for blood vessel detection. …”
Get full text
Get full text
Conference or Workshop Item -
13
A Toolkit for Simulation of Desktop Grid Environment
Published 2014“…A simulator for desktop grid environment has been developed using Java as the implementation language due to its wide popularity. …”
Get full text
Get full text
Final Year Project -
14
Performance of well known packet scheduling algorithms in the downlink 3GPP LTE system
Published 2009“…This paper contributes to the identification of a suitable packet scheduling algorithm for use in the downlink 3GPP LTE system supporting video streaming services. …”
Get full text
Get full text
Get full text
Proceeding Paper -
15
-
16
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…The methodology used in this study begun with problem identification, requirement identification, analysed the model process and design the simulation model. The simulation model was developed using Active Server Page, JavaScript and SQL 7.0 as database. …”
Get full text
Get full text
Get full text
Thesis -
17
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
18
Parallel distributed genetic algorithm development based on microcontrollers framework
Published 2023Conference paper -
19
Fuzzy modeling using Bat Algorithm optimization for classification
Published 2018“…In order to solve it, Bat Algorithm method is implement in to optimization method in fuzzy modeling for classification. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
20
Vibration-based structural damage detection and system identification using wavelet multiresolution analysis / Seyed Alireza Ravanfar
Published 2017“…In addition, the structural parameters of a system can be accurately estimated through the proposed system identification methods for both cases of linear and nonlinear conditions. …”
Get full text
Get full text
Get full text
Thesis
