Search Results - (( java application a algorithm ) OR ( parameter implementation graph algorithm ))
Search alternatives:
- parameter implementation »
- implementation graph »
- java application »
- graph algorithm »
- application a »
- a algorithm »
-
1
Static and dynamic graphs modeling of a boiler system / Noor Ainy Harish
Published 2015“…The dynamic graphs found from the implementation of DAGA to the boiler system are then further investigated where connection of the graphs to fuzzy graph of type-1 are established. …”
Get full text
Get full text
Thesis -
2
Parameter estimation of multivariable system using Fuzzy State Space Algorithm / Razidah Ismail … [et al.]
Published 2011“…In order to enhance the implementation of the algorithm, it is necesssary to develop an efficient computation program together with the user's interface. …”
Get full text
Get full text
Research Reports -
3
VISUALIZATION OF GENETIC ALGORITHM BASED ON 2-D GRAPH TO ACCELERATE THE SEARCHING WITH HUMAN INTERVENTIONS.
Published 2012“…A tool termed as VIGA-20 (Visualization of Genetic Algorithm using 2-0 Graph) is implemented to accomplish this goal. …”
Get full text
Get full text
Thesis -
4
The development of parameter estimation method for Chinese hamster ovary model using black widow optimization algorithm
Published 2020“…Metaheuristic parameter estimation is an algorithm framework that is processed using some technique to generate a pattern or graph. …”
Get full text
Get full text
Get full text
Article -
5
Power system network splitting and load frequency control optimization using ABC based algorithms / Kanendra Naidu a/l Vijyakumar
Published 2015“…This research presents a modified optimization program for the system splitting problem in large scale power system based on Artificial Bee Colony algorithm and graph theory. The post-islanding frequency stability is maintained by optimizing the Load Frequency Control‘s parameters. …”
Get full text
Get full text
Thesis -
6
-
7
RSA Encryption & Decryption using JAVA
Published 2006“…The key is the trigger mechanism to the algorithm. Until the advent of the Internet, encryption was rarely used by the public, but was largely a military tool. …”
Get full text
Get full text
Final Year Project -
8
Attack path selection optimization with adaptive genetic algorithms
Published 2016“…We describe our approach for implementing an optimized security assessment using Genetic Algorithm (GA). …”
Get full text
Get full text
Article -
9
Attack path selection optimization with adaptive genetic algorithms
Published 2016“…We describe our approach for implementing an optimized security assessment using Genetic Algorithm (GA). …”
Get full text
Get full text
Article -
10
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
11
Comparison performances between MABSA-PI controller and MABSA-PD controller for DC motor position system
Published 2023“…Modified adaptive bats sonar algorithm (MABSA) will be implemented in the PI controller and PD controller as the main algorithm. …”
Get full text
Get full text
Get full text
Article -
12
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
13
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
15
Application of genetic algorithm and JFugue in an evolutionary music generator
Published 2025“…This project explores the application of Genetic Algorithms (GA) with JFugue, which is a Java-based music programming library to develop an Evolutionary Music Generator. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
16
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
Get full text
Get full text
Conference or Workshop Item -
17
Real-time algorithmic music composition application.
Published 2022“…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
18
Route Optimization System
Published 2005“…This algorithm is an exact algorithm that is specifically for finding the shortest route in a network. …”
Get full text
Get full text
Final Year Project -
19
The existence of inflection points for generalized log-aesthetic curves satisfying G1 data
Published 2015“…Log-Aesthetic (LA) curves have been implemented in a CAD/CAM system for various design feats.LA curves possess linear Logarithmic Curvature Graph (LCG) with gradient (shape parameter) denoted as α.In 2009, a generalized form of LA curves called Generalized Log-Aesthetic Curves (GLAC) has been proposed which has an extra shape parameter as ν compared to LA curves.Recently, G1 continuous GLAC algorithm has been proposed which utilizes the extra shape parameter using four control points.This paper discusses on the existence of inflection points in a GLAC segment satisfying G1 Hermite data and the effect of inflection point on convex hull property.It is found that the existence of inflection point can be avoided by manipulating the value of α.Numerical experiments show that the increase of α may remove the inflection point (if any) in a GLAC segment.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
A direct proof of improved biased random walk with gastric cancer dataset
Published 2018“…An equation of biased random walk which named as significant directed random walk is formed to enhance the connectivity of nodes in directed graph via weigh. To be completely biased to the random walk, references data is implement as directed graph. …”
Get full text
Get full text
Conference or Workshop Item
