Search Results - (( java application interface algorithm ) OR ( parameter adaptation between algorithm ))
Search alternatives:
- parameter adaptation »
- adaptation between »
- between algorithm »
- java application »
-
1
Simultaneous Adaptation Of Multiple Genetic Algorithm Parameters Using Fuzzy Logic Controllers
Published 2010“…Ignoring the interaction between the adapted parameters or adapting one single parameter may have negative impact on the other related parameters, resulting in poor performance. …”
Get full text
Get full text
Thesis -
2
Real-time algorithmic music composition application.
Published 2022“…In addition, the system also utilises JavaFx and jFugue for its graphical user interface and music programming respectively. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
3
Self-adaptive Population Size Strategy Based on Flower Pollination Algorithm for T-Way Test Suite Generation
Published 2019“…Therefore, there is a need for proper parameter controls to balance out between intensification and diversification. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Application-Programming Interface (API) for Song Recognition Systems
Published 2024“…In addition the implementation is done by algorithm using Java’s programming language, executed through an application developed in the Android operating system. …”
Article -
5
DESIGN OF ADAPTIVE BACKSTEPPING WITH GRAVITATIONAL SEARCH ALGORITHM FOR NONLINEAR SYSTEM
Published 2014“…Gravitational search algorithm (GSA) is integrated with the designed controller in order to automatically tune its control parameters and adaptation gain since the tracking performance of the controller relies on these parameters. …”
Get full text
Get full text
Article -
6
Fuzzy Logic Based Self-Adaptive Handover Algorithm for MobileWiMAX.
Published 2013“…The proposed algorithm is derived from the self-adaptive handover parameters to overcome the mobile WiMAX ping-pong handover and handover delay issues. …”
Get full text
Get full text
Article -
7
Visdom: Smart guide robot for visually impaired people
Published 2025“…The system architecture integrates ROS 2 on a Raspberry Pi, with TCP/IP connectivity enabling remote operation. An Android mobile application, developed using Java and the java.net.Socket library, provides an intuitive and accessible user interface for seamless interaction with the robot. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
8
Visdom: Smart guide robot for visually impaired people
Published 2025“…The system architecture integrates ROS 2 on a Raspberry Pi, with TCP/IP connectivity enabling remote operation. An Android mobile application, developed using Java and the java.net.Socket library, provides an intuitive and accessible user interface for seamless interaction with the robot. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
9
Fuzzy adaptive emperor penguin optimizer for global optimization problems
Published 2023“…To alleviate this parameter tuning problem, an adaptive mechanism can be introduced in EPO. …”
Get full text
Get full text
Thesis -
10
Development Of Machine Learning User Interface For Pump Diagnostics
Published 2022Get full text
Get full text
Monograph -
11
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…A design proposal was outlined to provide an adaptive client/server approach to stream audio contents using Real-Time Transport Protocol (RTP) involving architecture based on the Java Media Framework (JMF) Application Programmable Interfaces (API).RTP protocol is the Internet-standard protocol for the transport of real-time data, including audio and video and can be implemented by using Java Media Framework (JMF). …”
Get full text
Get full text
Thesis -
12
A fuzzy adaptive teaching learning-based optimization strategy for generating mixed strength t-way test suites
Published 2019“…Unlike most existing meta-heuristic algorithms, and by virtue of being parameter-free, TLBO does not have any specific parameter controls. …”
Get full text
Get full text
Thesis -
13
Movie recommendation system / Najwa Syamimie Hasnu
Published 2020Get full text
Get full text
Thesis -
14
-
15
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
16
Performance study of adaptive filtering algorithms for noise cancellation of ECG signal
Published 2023“…After that, these noises have been mixed with ECG signal and nullify these noises using the LMS and the RLS algorithms. At the end of this paper, a performance study has been done between these algorithms based on their parameters and also discussed the effect of filter length and the corresponding correlation coefficient. …”
Conference paper -
17
-
18
Class binarization with self-adaptive algorithm to improve human activity recognition
Published 2018“…In order to estimate the quality of ‘pruned’ features, self-adaptive DE algorithm is proposed. Two parameters (population size and generation numbers) are adaptively adopted from number of remaining ranking features. …”
Get full text
Get full text
Thesis -
19
An Adaptive Switching Cooperative Source Searching And Tracing Algorithms For Underwater Acoustic Source Localization
Published 2019“…In addition, the ADAPSO position update equation is modified to anticipate position adjustment to ensure communication connectivity. To adaptively switches between the two algorithms, an adaptive switching algorithm based on a Generalized Likelihood Ratio Test (GLRT) is proposed. …”
Get full text
Get full text
Thesis -
20
An experimental study of a fuzzy adaptive emperor penguin optimizer for global optimization problem
Published 2022“…Within the EPO, two parameters need to be tuned (namely f and l ) to ensure a good balance between exploration (i.e., roaming unknown locations) and exploitation (i.e., manipulating the current known best). …”
Get full text
Get full text
Get full text
Article
