Search Results - (( java application optimisation algorithm ) OR ( construct validation during algorithm ))
Search alternatives:
- application optimisation »
- optimisation algorithm »
- construct validation »
- validation during »
- java application »
- during algorithm »
-
1
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
Get full text
Get full text
Get full text
Article -
2
A multi-depot vehicle routing problem with stochastic road capacity and reduced two-stage stochastic integer linear programming models for rollout algorithm
Published 2021“…The proposed approach is suitable for obtaining a policy constructed dynamically on the go during the rollout algorithm. …”
Get full text
Get full text
Article -
3
Landslide susceptibility mapping at VAZ watershed (Iran) using an artificial neural network model: a comparison between multilayer perceptron (MLP) and radial basic function (RBF)...
Published 2013“…Finally the landslide susceptibility maps were validated using the validation data (i.e., 30 % landslide location data that was not used during the model construction) using area under the curve (AUC) method. …”
Get full text
Get full text
Article -
4
Web-based expert system for material selection of natural fiber- reinforced polymer composites
Published 2015“…Finally, the developed expert system was deployed over the internet with central interactive interface from the server as a web-based application. As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
Get full text
Get full text
Thesis -
5
Key schedule algorithm based on coordinate geometry of a three-dimensional hybrid cube
Published 2019“…The Hybrid Cube Encryption Algorithm (HiSea) has been implemented to validate the encryption keys that are generated from the proposed algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
6
Theory-guided machine learning for predicting and minimising surface settlement caused by the excavation of twin tunnels / Chia Yu Huat
Published 2024“…This is due to the data generated from the numerical model possess the pattern for the ML algorithm ease of prediction. In addition, Coati Optimization algorithm, Particle Swarm Opimisation (PSO) and Bayesian Optimsiation (BO) are integrated to identify optimal parameters and minimize settlement during twin tunnel excavation and GBT with the optimisation algorithm has shown consistent capability identifying the least SS induced by twin tunnels Keyword: …”
Get full text
Get full text
Get full text
Thesis -
7
Transtheoretical model of change for weight control in Malaysian context
Published 2010“…Weight Efficacy Lifestyle Questionnaire (WELQ) was found to be applicable to measure Self-Efficacy construct of TIM. Scale validation obtained an I8-item, three subscales for WELQ. …”
Get full text
Get full text
Get full text
Thesis -
8
-
9
Reservoir Inflow Forecasting Using Artificial Neural Network and Adaptive Neuro-Fuzzy Inference System Techniques
Published 2007“…The simulation results from the selected ANFIS and ANN models during training, validation and testing revealed the superiority of the ANN model. …”
Get full text
Get full text
Thesis -
10
STUDY OF THE MICRO UNMANNED AERIAL VEHICLE (MUAV) VERTICAL TAKE-OFF AND LANDING (VTOL) CONTROL SYSTEM
Published 2011Get full text
Get full text
Final Year Project -
11
Load shedding scheme for islanded distribution network with flexible load selection and power changes / Ja’far Saifeddin Abdelhafiz Jallad
Published 2018“…Taking into account the time execution, the artificial neural network (ANN) model was constructed based on the daily load plots. The second aspect involve monitoring the overshooting signal of the second frequency derivative of the center of inertia so that we can detect new power deficits during the load shedding process. …”
Get full text
Get full text
Get full text
Thesis -
12
Adaptive hybrid fuzzy-proportional plus crisp-integral current control algorithm for shunt active power filter operation
Published 2016“…The effectiveness of the proposed CCA in regulating supply current is validated in both simulation and experimental work. …”
Get full text
Get full text
Article -
13
Time-Uncertainty Analysis by Using Simulation in Project Scheduling Networks
Published 1999“…Risks are inherently present In all construction projects. Quite often, construction projects fail to achieve their time quality and budget goals. …”
Get full text
Get full text
Thesis -
14
Application of system identification method coupled with evolutionary algorithms for the optimization of power consumption in a pem fuel cell propulsion system / Suhadiyana Hanapi
Published 2018“…Secondly, in this research, an empirical dynamic model of the PEM fuel cell system in vehicles was analyzed and validated using the system identification method……”
Get full text
Get full text
Book Section -
15
Finite element study of metacarpophalangeal joint silicone implants
Published 2008“…An inhouse experimentally validated algorithm was used to calculate and display interface micromotion between the implant and the bone. …”
Get full text
Get full text
Book Section -
16
Developing individualised therapy for colistin through application of pharmacokinetic model tailored for critically ill Malaysian patients utilizing the HPLC-FLD
Published 2025“…The Non-Parametric Adaptive Grid algorithm within Pmetrics software was used to develop a colistin pharmacokinetic model using meta-analysis data from 15 pharmacokinetic studies, and external validation of the final model was performed in 25 subjects (Malaysian and meta-analysis data). …”
Get full text
Get full text
Thesis -
17
Quantitative analysis of NaCl, NaOH, and β-phenylethylamine in water using ultraviolet spectroscopy coupled with partial least squares and net analyte preprocessing
Published 2020“…In addition, the independent test set was built up based on 34 samples to validate the prediction performance of the PLS regression models. …”
Get full text
Get full text
Get full text
Article -
18
MalDroid: Secure DL-enabled intelligent malware detection framework
Published 2021“…Moreover, the performance of the proposed algorithm has been verified both with the constructed hybrid DL-driven algorithms and current benchmarks. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
19
-
20
A single measurement of combined Direct and indirect MPPT algorithm for mismatch PV module application / Mohd Najib Mohd Hussain
Published 2016“…MIC is a promising method to keep the electrical power output from PV module at maximum capacity through maximum power point tracking (MPPT) algorithm during full-sun and mismatch module occurrence. …”
Get full text
Get full text
Thesis
