Search Results - (( java application tools algorithm ) OR ( square evaluation method algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The key is the trigger mechanism to the algorithm. Until the advent of the Internet, encryption was rarely used by the public, but was largely a military tool. …”
    Get full text
    Get full text
    Final Year Project
  4. 4
  5. 5
  6. 6

    An Educational Tool Aimed at Learning Metaheuristics by Kader, Md. Abdul, Jamaluddin, Jamal A., Kamal Z., Zamli

    Published 2020
    “…Initially, this tool adopts only Crow Search, Jaya, and Sine Cosine algorithms. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Simulation of fast recursive least square algorithm for echo cancellation system by Kamaruddin, Rosita

    Published 2003
    “…The performance of FRLS algorithm for both filters is described and evaluated by using MATLAB software .. …”
    Get full text
    Get full text
    Student Project
  8. 8

    Detection of multiple outliners in linear regression using nonparametric methods by Adnan, Robiah

    Published 2004
    “…Method 1 is a modification of Sebert’s method where the list squares (LS) fit is replaced by the least median of squares (LMS) fit while Method 2 is a modification of Sebert’s method where the least squares (LS) fit is replaced by the least trimmed of squares (LTS) fit. …”
    Get full text
    Get full text
    Monograph
  9. 9

    Model selection approaches of water quality index data by Kamarudin, Nur Azulia, Ismail, Suzilah

    Published 2016
    “…In order to select the best model, it is vital to ensure that proper estimation method is chosen in the modelling process.Different estimators have been proposed for the estimation of parameters of a model, including the least square and iterative estimators.This study aims to evaluate the forecasting performances of two algorithms on water quality index (WQI) of a river in Malaysia based on root mean square error (RMSE) and geometric root mean square error (GRMSE).Feasible generalised least squares (FGLS) and iterative maximum likelihood (ML) estimation methods are used in the algorithms, respectively.The results showed that SUREMLE-Autometrics has surpassed SURE-Autometrics; another simultaneous selection procedure of multipleequation models.Two individual selections, namely Autometrics-SUREMLE and Autometrics-SURE, though showed consistency only for GRMSE.All in all, ML estimation is a more appropriate method to be employed in this seemingly unrelated regression equations (SURE) model selection.…”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…This project is developed by using Rapid Application Development methodology as it is the model that is most suitable for developing this web tools. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12
  13. 13

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  14. 14

    Heartbeat Anomaly Detection Method Based on Electrocardiogram using Improved Certainty Cognitive Map by Sumiati, .

    Published 2023
    “…The test results of the MCM Method gave a Mean Squared Error (MSE) of 0.65 and Root Mean Squared Error (RMSE) of 0.80 and the test results of the CCM Method with a Mean Squared Error (MSE) of 0.15 and a Root Mean Squared Error (RMSE) of 0.39. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework by Asaad Aref, Ibrahim

    Published 2004
    “…Java Media Framework library and the RTP protocol for audio transmission were used as development tools.The developed system designed in this thesis together with experimental results proved that the system could be implemented successfully. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Implementation of Evolutionary Algorithms to Parametric Identification of Gradient Flexible Plate Structure by Annisa, Jamali, Lidyana, Roslan, Muhammad Hasbollah, Hassan

    Published 2023
    “…The obtained results were then compared with the conventional method that is recursive least square (RLS). The developed models were evaluated based on the lowest mean square error (MSE), within the 95% confidence level of both auto and cross-correlation tests as well as high stability in the pole-zero diagram. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Extended multiple models selection algorithms based on iterative feasible generalized least squares (IFGLS) and expectation-maximization (EM) algorithm by Nur Azulia, Kamarudin

    Published 2019
    “…Therefore, in this study SUREAutometrics is improvised using two MLE methods, which are iterative feasible generalized least squares (IFGLS) and expectation-maximization (EM) algorithm, named as SURE(IFGLS)-Autometrics and SURE(EM)-Autometrics algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Adaptive filtering of EEG/ERP through bounded range artificial Bee Colony (BR-ABC) algorithm by Ahirwal, M.K., Kumar, A., Singh, G.K.

    Published 2014
    “…ANCs are also implemented with Least Mean Square (LMS) and Recursive Least Square (RLS) algorithm. …”
    Get full text
    Get full text
    Article
  20. 20

    Development of an Image Encryption Algorithm using Latin Square Matrix and Logistics Map by Emmanuel Oluwatobi Asani, Godsfavour Biety-Nwanju, Abidemi Emmanuel Adeniyi, Salil Bharany, Ashraf Osman Ibrahim Elsayed, Anas W. Abulfaraj, Wamda Nagmeldin

    Published 2023
    “…The issue of misplaced pixel positions in the image was also adequately addressed, making it an effective method for image encryption. The hybrid technique was simulated on image data and evaluated to gauge its performance. …”
    Get full text
    Get full text
    Get full text
    Article