Search Results - (( java application modified algorithm ) OR ( parameter implementation success algorithm ))

Refine Results
  1. 1
  2. 2

    Controller And Circuitry Design And Implementation For Fire Fighting Robot For MIROC 2014 Competition by Reyfill Konnik, Charlie Ivan

    Published 2014
    “…The metric that is used to assess the algorithm's success are movement stability, consistency and accuracy.…”
    Get full text
    Get full text
    Final Year Project
  3. 3
  4. 4

    A simple and fast algorithm to estimate effective anisotropy parameters by Prajapati, S., Ghosh, D.

    Published 2014
    “…To resolve above issues, we implement the modified and extended Backus's averaging algorithm to estimate the effective stiffness parameters and anisotropic parameters, which is very consistent with the well logs and successfully distinguished potential reservoir embedded by shale.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Three-term backpropagation algorithm for classification problem by Saman, Fadhlina Izzah

    Published 2006
    “…Standard Backpropagation Algorithm (BP) is a widely used algorithm in training Neural Network that is proven to be very successful in many diverse application. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Machining optimization using Firefly Algorithm / Farhan Md Jasni by Md Jasni, Farhan

    Published 2020
    “…Based on the previous research on the success of Firefly Algorithm, this approach will be able to optimize the machining parameter of milling operation. …”
    Get full text
    Get full text
    Student Project
  7. 7

    PID Tuning Of Process Plant Using Evolutionary Algorithm by Guong, Robert Ling Leh

    Published 2014
    “…In this project, Evolutionary algorithm (Particle Swarm Optimization) is implemented to optimize the controller parameters in order to improve the system performance of the real pressure plant. …”
    Get full text
    Get full text
    Final Year Project
  8. 8

    Voltage Variation Analysis By Using Gabor Transform by Abdullah, Abdul Rahim, Tee, Wei Hown, Yusoff, Mohd Rahimi

    Published 2019
    “…The voltage variation signals are successfully detected by using the K-Nearest Neighbors (kNN) algorithm with the implementation of signal parameters extracted as the input on the classifier. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Static and self-scalable filter range selection algorithms for peer-to-peer networks by Kweh, Yeah Lun

    Published 2011
    “…The research works were implemented by simulation in which it was used to identify the selection problem, implementation of the proposed algorithms and the measurement of the results. …”
    Get full text
    Get full text
    Thesis
  10. 10

    The design and applications of the african buffalo algorithm for general optimization problems by Odili, Julius Beneoluchi

    Published 2017
    “…A critical look at these ‘efficient’ stochastic algorithms reveals the need for improvements in the areas of effectiveness, the number of several parameters used, premature convergence, ability to search diverse landscapes and complex implementation strategies. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Adaptive differential evolution algorithm with fitness based selection of parameters and mutation strategies / Rawaa Dawoud Hassan Al-Dabbagh by Rawaa Dawoud Hassan, Al-Dabbagh

    Published 2015
    “…ARDE algorithm makes use of JADE strategy and the MDE_pBX parameters adaptive schemes as frameworks. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13
  14. 14

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…A GUI is created in a form of JAVA application to display data detected from tag. …”
    Get full text
    Get full text
    Thesis
  15. 15

    The normalized random map of gradient for generating multifocus image fusion by Ismail, ., Kamarul Hawari, Ghazali

    Published 2020
    “…It successes to eliminate the mathematical and algorithm problems. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Fraud detection in telecommunication industry using Gaussian mixed model by Mohd Yusoff, Mohd Izhan, Mohamed, Ibrahim, Abu Bakar, Mohd Rizam

    Published 2013
    “…The expectation maximization algorithm is used to estimate the parameter of the model such that the initial values of the algorithm is determined using the kernel method. …”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Load dispatch optimization of open cycle industrial gas turbine plant incorporating operational, maintenance and environmental parameters by Fong, Yeow Huang

    Published 2006
    “…The objective of this work is to develop a multi-objective optimization model and optimization algorithm for load dispatching optimization of open cycle gas turbine plant that not only consider operational parameters, but also incorporates maintenance and environmental parameters. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Identification of continuous-time model of hammerstein system using modified multi-verse optimizer by Most. Julakha, Jahan Jui

    Published 2021
    “…Multi-Verse Optimizer (MVO) is one of the most recent robust nature-inspired metaheuristic algorithm. It has been successfully implemented and used in various areas such as machine learning applications, engineering applications, network applications, parameter control, and other similar applications to solve optimization problems. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Workability review of genetic algorithm approach in networks by Nurika, O., Zakaria, N., Hassan, F., Jung, L.T.

    Published 2014
    “…Generally, genetic algorithm process will accomplish according to its parameters sizes. …”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…The algorithm is implemented as a plugin. It does not interfere with the web application original code. …”
    Get full text
    Get full text
    Conference or Workshop Item