Search Results - (( java application model algorithm ) OR ( square evaluation method algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3
  4. 4

    Simulation of fast recursive least square algorithm for echo cancellation system by Kamaruddin, Rosita

    Published 2003
    “…The performance of FRLS algorithm for both filters is described and evaluated by using MATLAB software .. …”
    Get full text
    Get full text
    Student Project
  5. 5

    Detection of multiple outliners in linear regression using nonparametric methods by Adnan, Robiah

    Published 2004
    “…Method 1 is a modification of Sebert’s method where the list squares (LS) fit is replaced by the least median of squares (LMS) fit while Method 2 is a modification of Sebert’s method where the least squares (LS) fit is replaced by the least trimmed of squares (LTS) fit. …”
    Get full text
    Get full text
    Monograph
  6. 6

    Real-time algorithmic music composition application. by Yap, Alisa Yi Hui

    Published 2022
    “…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  7. 7

    Model selection approaches of water quality index data by Kamarudin, Nur Azulia, Ismail, Suzilah

    Published 2016
    “…In order to select the best model, it is vital to ensure that proper estimation method is chosen in the modelling process.Different estimators have been proposed for the estimation of parameters of a model, including the least square and iterative estimators.This study aims to evaluate the forecasting performances of two algorithms on water quality index (WQI) of a river in Malaysia based on root mean square error (RMSE) and geometric root mean square error (GRMSE).Feasible generalised least squares (FGLS) and iterative maximum likelihood (ML) estimation methods are used in the algorithms, respectively.The results showed that SUREMLE-Autometrics has surpassed SURE-Autometrics; another simultaneous selection procedure of multipleequation models.Two individual selections, namely Autometrics-SUREMLE and Autometrics-SURE, though showed consistency only for GRMSE.All in all, ML estimation is a more appropriate method to be employed in this seemingly unrelated regression equations (SURE) model selection.…”
    Get full text
    Get full text
    Get full text
    Article
  8. 8
  9. 9

    Heartbeat Anomaly Detection Method Based on Electrocardiogram using Improved Certainty Cognitive Map by Sumiati, .

    Published 2023
    “…The test results of the MCM Method gave a Mean Squared Error (MSE) of 0.65 and Root Mean Squared Error (RMSE) of 0.80 and the test results of the CCM Method with a Mean Squared Error (MSE) of 0.15 and a Root Mean Squared Error (RMSE) of 0.39. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11
  12. 12
  13. 13

    Implementation of Evolutionary Algorithms to Parametric Identification of Gradient Flexible Plate Structure by Annisa, Jamali, Lidyana, Roslan, Muhammad Hasbollah, Hassan

    Published 2023
    “…The obtained results were then compared with the conventional method that is recursive least square (RLS). The developed models were evaluated based on the lowest mean square error (MSE), within the 95% confidence level of both auto and cross-correlation tests as well as high stability in the pole-zero diagram. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14
  15. 15

    Extended multiple models selection algorithms based on iterative feasible generalized least squares (IFGLS) and expectation-maximization (EM) algorithm by Nur Azulia, Kamarudin

    Published 2019
    “…Therefore, in this study SUREAutometrics is improvised using two MLE methods, which are iterative feasible generalized least squares (IFGLS) and expectation-maximization (EM) algorithm, named as SURE(IFGLS)-Autometrics and SURE(EM)-Autometrics algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    A Toolkit for Simulation of Desktop Grid Environment by FOROUSHAN, PAYAM CHINI

    Published 2014
    “…In this type of environment it is nearly impossible to prove the effectiveness of a scheduling algorithm. Hence the main objective of this study is to develop a desktop grid simulator toolkit for measuring and modeling scheduler algorithm performance. …”
    Get full text
    Get full text
    Final Year Project
  17. 17

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…The objective of this study is to enhance the confidentiality and security of the image steganography application by combining cryptography algorithm. In this proposed model, the RSA algorithm is used to encrypt a secret message into an unreadable ciphertext before hiding it in the image. …”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment by Ruzita, Ahmad

    Published 2013
    “…This thesis describes original research in the field of software quality model by presenting a Feature Ranking Algorithm (FRA) for Pragmatic Quality Factor (PQF) model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Adaptive filtering of EEG/ERP through bounded range artificial Bee Colony (BR-ABC) algorithm by Ahirwal, M.K., Kumar, A., Singh, G.K.

    Published 2014
    “…ANCs are also implemented with Least Mean Square (LMS) and Recursive Least Square (RLS) algorithm. …”
    Get full text
    Get full text
    Article
  20. 20

    Development of an Image Encryption Algorithm using Latin Square Matrix and Logistics Map by Emmanuel Oluwatobi Asani, Godsfavour Biety-Nwanju, Abidemi Emmanuel Adeniyi, Salil Bharany, Ashraf Osman Ibrahim Elsayed, Anas W. Abulfaraj, Wamda Nagmeldin

    Published 2023
    “…The issue of misplaced pixel positions in the image was also adequately addressed, making it an effective method for image encryption. The hybrid technique was simulated on image data and evaluated to gauge its performance. …”
    Get full text
    Get full text
    Get full text
    Article