Search Results - (( java implementation a algorithm ) OR ( parameter identification method algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The key is the trigger mechanism to the algorithm. Until the advent of the Internet, encryption was rarely used by the public, but was largely a military tool. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    Hybrid DE and PEM algorithm for identification of small scale Autonomous helicopter model by Legowo, Ari

    Published 2012
    “…The proposed hybrid identification method explored the evolutionary search optimization strength of DE for parameter initialization for PEM identification algorithm…”
    Get full text
    Get full text
    Monograph
  3. 3

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  4. 4

    MULTIVARIABLE CLOSED-LOOP SYSTEM IDENTIFICATION USING ITERATIVE LEAKY LEAST MEAN SQUARES METHOD by MOHAMED OSMAN, MOHAMED ABDELRAHIM

    Published 2017
    “…Channel isolation usmg partial correlation analysis and estimation of model parameters in the conventional multivariable closed-loop system identification approaches use the method of Least Square (LS) with the limitations, viz. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Recursive Subspace Identification Algorithm Using The Propagator Based Method by Jamaludin, Irma Wani, Abdul Wahab, Norhaliza

    Published 2017
    “…In this paper, the recursive subspace identification algorithm based on the propagator method which avoids the SVD computation is proposed. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Parameter identification of thermoelectric modules using enhanced slime mould algorithm (ESMA) by Ponnalagu, Dharswini, Mohd Ashraf, Ahmad, Jui, Julakha Jahan

    Published 2024
    “…The proposed method incorporates a pair of modifications to the standard slime mould algorithm (SMA). …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Provider independent cryptographic tools by Ibrahim, Subariah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
    Get full text
    Get full text
    Get full text
    Monograph
  9. 9

    Hybrid intelligent methods for parameter identification and load frequency control in power system by Aqeel Sakhy, Jaber

    Published 2014
    “…For example, the classical methods for parameter identification (LSE and MLE), the classical methods for LFC (PI, PD and PID) and the intelligent methods (fuzzy logic, neural network, genetic algorithm, and PSO). …”
    Get full text
    Get full text
    Thesis
  10. 10

    Simultaneous Computation of Model Order and Parameter Estimation for System Identification Based on Gravitational Search Algorithm by Kamil Zakwan, Mohd Azmi, Pebrianti, Dwi, Zuwairie, Ibrahim, Shahdan, Sudin, Sophan Wahyudi, Nawawi

    Published 2015
    “…From the simulation, it is proven that the proposed method can be an alternative technique for solving the system identification problem. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Performance evaluation of real-time multiprocessor scheduling algorithms by Alhussian, H., Zakaria, N., Abdulkadir, S.J., Fageeri, S.O.

    Published 2016
    “…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    A hybrid metaheuristic algorithm for identification of continuous-time Hammerstein systems by Jui, Julakha Jahan, Mohd Ashraf, Ahmad

    Published 2021
    “…This paper presents a new hybrid identification algorithm called the Average Multi-Verse Optimizer and Sine Cosine Algorithm for identifying the continuous-time Hammerstein system. …”
    Get full text
    Get full text
    Article
  13. 13

    Identification of continuous-time model of hammerstein system using modified multi-verse optimizer by Most. Julakha, Jahan Jui

    Published 2021
    “…The statistical analysis value (mean) was taken from the parameter deviation index to see how much our proposed algorithm has improved. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Automatic Number Plate Recognition on android platform: With some Java code excerpts by ., Abdul Mutholib, Gunawan, Teddy Surya, Kartiwi, Mira

    Published 2016
    “…The main challenges of implementing ANPR algorithm on mobile phone are how to produce a higher coding efficiency, lower computational complexity, and higher scalability. …”
    Get full text
    Get full text
    Get full text
    Book
  15. 15

    Identification of continuous-time hammerstein system using sine cosine algorithm by E. F., Junis, J. J., Jui, Mohd Helmi, Suid, Mohd Ashraf, Ahmad

    Published 2019
    “…This paper presents the development of identification of continuous-time Hammerstein systems based on Sine Cosine Algorithm (SCA). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Modified multi-verse optimizer for nonlinear system identification of a double pendulum overhead crane by Julakha, Jahan Jui, Mohd Ashraf, Ahmad, Muhammad Ikram, Mohd Rashid

    Published 2021
    “…The efficiency of the proposed HMVOSCA algorithm is evaluated using the convergence curve, parameter estimation error, bode plot, function plot, and Wilcoxon's test method. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Identification of manipulator kinematics parameters through iterative method by Baharin, Iskandar, Hasan, Md. Mahmud

    “…In this study, a numerical procedure for the identification of manipulator kinematics parameters is proposed to determine the precise positioning of a robot. …”
    Get full text
    Conference or Workshop Item
  18. 18
  19. 19

    Identification of hammerstain model using stochastic perturbation simultaneous approximation by Nurriyah, Mohd Noor

    Published 2016
    “…The main benefit of the SPSA-based method is it can be applied to identification of Hammerstein systems even though less restrictive assumptions. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  20. 20

    Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework by Asaad Aref, Ibrahim

    Published 2004
    “…A design proposal was outlined to provide an adaptive client/server approach to stream audio contents using Real-Time Transport Protocol (RTP) involving architecture based on the Java Media Framework (JMF) Application Programmable Interfaces (API).RTP protocol is the Internet-standard protocol for the transport of real-time data, including audio and video and can be implemented by using Java Media Framework (JMF). …”
    Get full text
    Get full text
    Thesis