Search Results - (( java _ implementation algorithm ) OR ( parameters deviations methods algorithm ))

Search alternatives:

Refine Results
  1. 1

    Improving the Muskingum flood routing method using a hybrid of particle swarm optimization and bat algorithm by Ehteram M., Othman F.B., Yaseen Z.M., Afan H.A., Allawi M.F., Malek M.B.A., Ahmed A.N., Shahid S., Singh V.P., El-Shafie A.

    Published 2023
    “…Decision making; Disaster prevention; Floods; Routing algorithms; Water resources; Absolute deviations; Bat algorithms; Comparative analysis; Computational time; Flood routing; Muskingum models; Particle swarm optimization algorithm; Swarm algorithms; Particle swarm optimization (PSO); accuracy assessment; algorithm; comparative study; decision making; flood; flood forecasting; flood routing; numerical method; optimization; parameter estimation; water resource; United Kingdom; United States…”
    Article
  2. 2

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…Today, with online marketing, banking, healthcare and other services, even the average householder is aware of encryption. The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  3. 3

    A hybrid metaheuristic algorithm for identification of continuous-time Hammerstein systems by Jui, Julakha Jahan, Mohd Ashraf, Ahmad

    Published 2021
    “…The results showed that the proposed method was efficient in identifying both the Hammerstein model subsystems in terms of the quadratic output estimation error and parameter deviation index. …”
    Get full text
    Get full text
    Article
  4. 4

    Provider independent cryptographic tools by Ibrahim, Subariah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
    Get full text
    Get full text
    Get full text
    Monograph
  5. 5

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  6. 6

    PID Parameters Improvement for AGC in Three Parallel-Connected Power Systems by Mushtaq, Najeeb, Ramdan, Razali, K. G., Mohammed, Hamdan, Daniyal, Ali, M. Humada

    Published 2016
    “…The optimal parameters of the PID scheme optimized by the proposed MS algorithm are compared with that one’s obtained by GA algorithm, and the proposed method has proven that its performance is more efficient and improved as well. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Statistical approach on grading: mixture modeling by Md. Desa, Zairul Nor Deana

    Published 2006
    “…The problem lies in estimating the posterior density of the parameters which is analytically intractable. A solution to this problem is using the Markov Chain Monte Carlo method namely Gibbs sampler algorithm. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Improving the Muskingum flood routing method using a hybrid of particle swarm optimization and bat algorithm by Ehteram, Mohammad, Othman, Faridah, Yaseen, Zaher Mundher, Afan, Haitham Abdulmohsin, Allawi, Mohammed Falah, Malek, Marlinda Abdul, Ahmed, Ali Najah, Shahid, Shamsuddin, Singh, Vijay P., El-Shafie, Ahmed

    Published 2018
    “…In this study, a hybrid of the bat algorithm (BA) and the particle swarm optimization (PSO) algorithm, i.e., the hybrid bat-swarm algorithm (HBSA), was developed for the optimal determination of these four parameters. …”
    Get full text
    Get full text
    Article
  10. 10

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Real-Time Optimal Trajectory Correction (ROTC) for autonomous quadrotor / Noorfadzli Abdul Razak by Abdul Razak, Noorfadzli

    Published 2018
    “…There are two stages implicated in the algorithm. First stage comprises a deviation scheme used to sense a deviation via an accelerometer and formulates a vector by applying double integration techniques fused with Kalman’s Filter (KF). …”
    Get full text
    Get full text
    Thesis
  12. 12

    Performance evaluation of real-time multiprocessor scheduling algorithms by Alhussian, H., Zakaria, N., Abdulkadir, S.J., Fageeri, S.O.

    Published 2016
    “…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    An Optimized PID Parameters for LFC in Interconnected Power Systems Using MLSL Optimization Algorithm by Najeeb, Mushtaq, Shahooth, Mohammed, Mohaisen, Arrak, Ramdan, Razali, Hamdan, Daniyal

    Published 2016
    “…In order to enhance the dynamic performance, the optimal parameters of the PID scheme which optimized by the proposed MLSL algorithm are compared with that one’s obtained by GA algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Automatic Number Plate Recognition on android platform: With some Java code excerpts by ., Abdul Mutholib, Gunawan, Teddy Surya, Kartiwi, Mira

    Published 2016
    “…The main challenges of implementing ANPR algorithm on mobile phone are how to produce a higher coding efficiency, lower computational complexity, and higher scalability. …”
    Get full text
    Get full text
    Get full text
    Book
  15. 15

    Flood Routing in River Reaches Using a Three-Parameter Muskingum Model Coupled with an Improved Bat Algorithm by Farzin, Saeed, Singh, Vijay, Karami, Hojat, Farahani, Nazanin, Ehteram, Mohammad, Kisi, Ozgur, Allawi, Mohammed Falah, Mohd, Nuruol Syuhadaa, El-Shafie, Ahmed

    Published 2018
    “…Design of hydraulic structures, flood warning systems, evacuation measures, and traffic management require river flood routing. A common hydrologic method of flood routing is the Muskingum method. The present study attempted to develop a three-parameter Muskingum model considering lateral flow for flood routing, coupling with a new optimization algorithm namely, Improved Bat Algorithm (IBA). …”
    Get full text
    Get full text
    Article
  16. 16

    Parameter estimation and outlier detection in linear functional relationship model / Adilah Abdul Ghapor by Adilah, Abdul Ghapor

    Published 2017
    “…The simulation results indicate that the proposed method is suitable to detect a single outlier. As for the multiple outliers, a clustering algorithm is considered and a dendogram to visualise the clustering algorithm is used. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Neural Network Model and Finite Element Simulation of Spring back in Plane-Strain Metallic Beam Bending by Abu Khadra, Fayiz Y. M.

    Published 2006
    “…The standard deviation between the finite element method and the neural network metamodels for the two functions are 0.635 degree and 0.985 mm respectively. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Investigation of firefly algorithm and chaos firefly algorithm for load prequency control / Zaid Najid by Zaid, Najid

    Published 2015
    “…In order to obtain the best controller parameter values for LFC, Firefly Algorithm (FA) and Chaos Firefly Algorithm (CFA) are used. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Metaheuristic Algorithm for Wellbore Trajectory Optimization by Biswas, K., Vasant, P.M., Vintaned, J.A.G., Watada, J.

    Published 2019
    “…For smooth and effective performance (i.e. quickly locating global optima while taking the shortest amount of computational time) we must identify flexible control parameters. Later this parameter can be effectively fixed to tune different algorithm. …”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework by Asaad Aref, Ibrahim

    Published 2004
    “…Java Media Framework library and the RTP protocol for audio transmission were used as development tools.The developed system designed in this thesis together with experimental results proved that the system could be implemented successfully. …”
    Get full text
    Get full text
    Thesis