Search Results - (( java application testing algorithm ) OR ( square evaluation path algorithm ))

Refine Results
  1. 1
  2. 2

    Comparison of performance and computational complexity of nonlinear active noise control algorithms by Sahib, Mouayad A., Raja Ahmad, Raja Mohd Kamil

    Published 2011
    “…The evaluation of the algorithms performance is standardized in terms of the normalized mean square error while the computational complexity is calculated based on the number of multiplications and additions in a single iteration. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  4. 4

    Nonlinear adaptive algorithm for active noise control with loudspeaker nonlinearity by Dehkordi, Sepehr Ghasemi

    Published 2014
    “…The proposed THF-NLFXLMS algorithm models the Wiener secondary path and applies the estimated degree of nonlinearity of the nonlinear secondary path in the control algorithm design. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Nonlinear THF-FXLMS algorithm for active noise control with loudspeaker nonlinearity by Ghasemi, Sepehr, Raja Ahmad, Raja Mohd Kamil, Marhaban, Mohammad Hamiruce

    Published 2016
    “…The proposed THF-NLFXLMS algorithm, models the nonlinear secondary path and applies the estimated degree of nonlinearity in the control algorithm design. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…Performance Testing is used to test the performance of algorithm implementations in applications. …”
    Get full text
    Get full text
    Journal
  7. 7

    Development of a State-Space Observer for Active Noise Control Systems by Muhssin, Mazin T.

    Published 2009
    “…The secondary path of the ANC system is modeled by using the LMS algorithm to complete the design of the Filtered-X Least Mean Square (FXLMS) controller. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Design of self-tuning minimum effort active noise control with feedback inclusion architecture by Raja Ahmad, Raja Mohd Kamil, Tokhi, Mohammad Osman

    Published 2009
    “…It was found that the optimal controller designed using this technique which is constrained only by the accuracy of the two models identified using recursive least squares algorithm, yields good cancellation level. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Investigating the reliability of machine learning algorithms as an advanced tool for ozone concentration prediction by Ayman Mohammed Shaher Yafouz, Mr.

    Published 2023
    “…The standalone and hybrid models have been tested to evaluate their performance via 5 metrics performances; (Coefficient of Determination (R2), Normalized Root Mean Square Error (NRMSE), Root Mean Square Error (RMSE), Mean Square Error (MSE), Mean Absolute Error (MAE)), and Modified Taylor Diagram. …”
    text::Thesis
  11. 11
  12. 12

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  13. 13

    Classification System for Heart Disease Using Bayesian Classifier by Magendram, Anusha

    Published 2007
    “…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15
  16. 16

    Steganography based on utilizing more surrounding pixels by Afrakhteh, Masoud

    Published 2010
    “…Furthermore, the method is proved to be robust against one of the common attacks to stego-images known as Chi-squared attack.…”
    Get full text
    Get full text
    Thesis
  17. 17

    Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli by Zulkifli, Nur Rasyiqah

    Published 2019
    “…The programming language that is used to write the program is Java Language that will run on android phones. As the result, this project was tested on the functionality of the mobile messaging application. …”
    Get full text
    Get full text
    Student Project
  18. 18
  19. 19

    Real time nonlinear filtered-x lms algorithm for active noise control by Sahib, Mouayad Abdulredha

    Published 2012
    “…The performance of these algorithms is usually compared with the standard linear filtered-x least mean square (FXLMS) algorithm. …”
    Get full text
    Get full text
    Thesis
  20. 20