Search Results - (( java application using algorithm ) OR ( next iteration method algorithm ))

Refine Results
  1. 1
  2. 2

    VLSI floor planning optimization using genetic algorithm and cross entropy method / Angeline Teoh Szu Fern by Angeline Teoh, Szu Fern

    Published 2012
    “…This method is used to reduce the stochastic of data generation as the second iteration will have influence of the first iteration data. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Optimizing the placement of fire department in Kulim using greedy heuristic and simplex method / Muhammad Abu Syah Mohd Suzaly by Mohd Suzaly, Muhammad Abu Syah

    Published 2023
    “…The next method is simplex method. The simplex method is a conceptual model approach for analysing linear programming problems with any number of variables. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Kelantan daily water level prediction model using hybrid deep-learning algorithm for flood forecasting by Loh, Eng Chuen

    Published 2021
    “…Therefore, this present study had imputed the missing hydrological data using five imputation methods, namely Neural Network (NN), Moving Median (MM), Iterative Algorithm (IA), Nonlinear Iterative Partial Least Square (NIPALS), and Combined Correlation with Inversed Distance (CCID) imputation methods. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Improving pipelined time stepping algorithm for distributed memory multicomputers by Ng, Kok Fu, Norhashidah Hj. Mohd. Ali

    Published 2010
    “…Our goal is to reduce the inter-time step communications while providing adequate information for the next time step to converge. Numerical result confirms that the improved algorithm is faster than the original pipelined algorithm and sequential time stepping algorithm with spatial parallelisation alone. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  7. 7

    A novel peak detection algorithm using particle swarm optimization for chew count estimation of a contactless chewing detection by Selamat, Nur Asmiza, Md. Ali, Sawal Hamid, Minhad, Khairun Nisa’, Ahmad, Siti Anom, Sampe, Jahariah

    Published 2022
    “…The proposed estimation approach simplifies the typical trial-and-error method. During optimization, within 100 iterations, the chewing count is reduced by 12.9% from its first iteration. …”
    Get full text
    Get full text
    Article
  8. 8
  9. 9

    Enhancement of network security by use machine learning by Hasan, Ahmed Raheem

    Published 2019
    “…The time taken to reach the accuracy is also short with less number of iteration. The ANNDL uses iterations method to detect the data, do matching and identify the data. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Improved hybrid methods in solving single variable nonlinear algebraic equations / Nor Hanim Abd Rahman by Abd Rahman, Nor Hanim

    Published 2017
    “…As a result of hybriding several methods, both improved algorithms of HTP and HHTP established faster, more reliable and better outputs, in comparison to other classical methods. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Improved Switching-Basedmedian Filter For Impulse Noise Removal by Teoh, Sin Hoong

    Published 2013
    “…Then, instead of using adaptive approach for noise cancellation stage, the proposed method utilizes iterative approach. Broad impulse noise model has been employed for the evaluation process, to investigate the robustness of the method. …”
    Get full text
    Get full text
    Thesis
  13. 13

    A novel peak detection algorithm using particle swarm optimization for chew count estimation of a contactless chewing detection by Selamat, Nur Asmiza, Md. Ali, Sawal Hamid, Minhad, Khairun Nisa’, Ahmad, Siti Anom

    Published 2022
    “…The proposed estimation approach simplifies the typical trial-and-error method. During optimization, within 100 iterations, the chewing count is reduced by 12.9% from its first iteration. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Deriving the absorption coefficients of lattice mismatched InGaAs using genetic algorithm by Lee H.J., Ali Gamel M.M., Ker P.J., Jamaludin M.Z., Wong Y.H., Yap K.S., Willmott J.R., Hobbs M.J., David J.P.R., Tan C.H.

    Published 2024
    “…By selecting the best gene for the next iteration, the utilization of Genetic Algorithm has significantly reduced the number of iterations from a maximum of 10 000 to 300. …”
    Article
  15. 15

    Generalized Fibonacci search for optimization of unconstrained one-and two-dimensional unimodal functions by Chong, Chin Yoon *

    Published 2023
    “…We develop a macro program in Microsoft Excel to execute the algorithm of the Swing Descent method to optimize a number of two-dimensional benchmark functions. …”
    Get full text
    Thesis
  16. 16

    OPTIMIZATION OF HYBRID-FUZZY CONTROLLER FOR SERVOMOTOR CONTROL USING A MODIFIED GENETIC ALGORITHM by WAHYUNGGORO, OYAS WAHYUNGGORO

    Published 2011
    “…The significant drawback of GA is that the optimization process needs too many iterations and too long duration. In this thesis, a new optimization GA-based algorithm that emanates from modification of conventional GA to reduce the iterations number and the duration time, namely, semi-parallel operation genetic algorithm (SPOGA) is proposed. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    A maximal-clique-based clustering approach for multi-observer multi-view data by using k-nearest neighbor with S-pseudo-ultrametric induced by a fuzzy similarity by Khameneh, Azadeh Zahedi, Ghaznavi, Mehrdad, Kilicman, Adem, Mahad, Zahari, Mardani, Abbas

    Published 2024
    “…Besides, most existing approaches handle multi-view clustering by aggregating each view’s clusters or using an iterative optimization method; both are time-consuming. …”
    Get full text
    Get full text
    Article
  18. 18

    Breast cancer disease classification using fuzzy-ID3 algorithm based on association function by Nur Farahaina, Idris, Mohd Arfian, Ismail, Mohd Saberi, Mohamad, Shahreen, Kasim, Zalmiyah, Zakaria, Sutikno, Tole

    Published 2022
    “…The FID3-AF algorithm is a hybridisation of the fuzzy system, the iterative dichotomizer 3 (ID3) algorithm, and the association function. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Task scheduling based on genetic algorithm for robotic system in 5G manufacturing industry by Anwar Apandi, Nur Ilyana, Wan, Wing Sheng, Muhammad, N. A.

    Published 2022
    “…Genetic Algorithm (GA) is applied to task scheduling, and it provides a better solution from previous results or arrangements due to iteration. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Real-Time Video Processing Using Native Programming on Android Platform by Saipullah, Khairul Muzzammil

    Published 2012
    “…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item