Search Results - (( java implementation level algorithm ) OR ( model estimation method algorithm ))

Refine Results
  1. 1

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…The encryption algorithms are playing an important part in the protection level for data. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  3. 3

    Semiparametric inference procedure for the accelarated failure time model with interval-censored data by Karimi, Mostafa

    Published 2019
    “…A computationally simple two-step iterative algorithm, called estimationapproximation algorithm, is introduced for estimating the parameters of the model on the basis of the rank estimators. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Multiple equations model selection algorithm with iterative estimation method by Kamarudin, Nur Azulia, Ismail, Suzilah

    Published 2016
    “…In particular, an algorithm on model selection for seemingly unrelated regression equations model using iterative feasible generalized least squares estimation method is proposed. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter by Azhar, Nur Huwaina

    Published 2019
    “…It does not consider the LACE algorithm implemented in huge number of server in one Cloud datacenter. …”
    Get full text
    Get full text
    Thesis
  6. 6

    An Improved Scatter Search Algorithm for Parameter Estimation in Large-Scale Kinetic Models of Biochemical Systems by Muhammad Akmal, Remli, Mohd Saberi, Mohamad, Safaai, Deris, Sinnott, Richard O., Suhaimi, Napis

    Published 2019
    “…Based on the results, the QOBLESS method can be used as an efficient parameter estimation method in large-scale kinetic model building.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    An improved scatter search algorithm for parameter estimation in large-scale kinetic models of biochemical systems by Remli, Muhammad Akmal, Mohamad, Mohd Saberi, Deris, Safaai, Sinnott, Richard, Napis, Suhaimi

    Published 2019
    “…Based on the results, the QOBLESS method can be used as an efficient parameter estimation method in large-scale kinetic model building.…”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Model selection approaches of water quality index data by Kamarudin, Nur Azulia, Ismail, Suzilah

    Published 2016
    “…In order to select the best model, it is vital to ensure that proper estimation method is chosen in the modelling process.Different estimators have been proposed for the estimation of parameters of a model, including the least square and iterative estimators.This study aims to evaluate the forecasting performances of two algorithms on water quality index (WQI) of a river in Malaysia based on root mean square error (RMSE) and geometric root mean square error (GRMSE).Feasible generalised least squares (FGLS) and iterative maximum likelihood (ML) estimation methods are used in the algorithms, respectively.The results showed that SUREMLE-Autometrics has surpassed SURE-Autometrics; another simultaneous selection procedure of multipleequation models.Two individual selections, namely Autometrics-SUREMLE and Autometrics-SURE, though showed consistency only for GRMSE.All in all, ML estimation is a more appropriate method to be employed in this seemingly unrelated regression equations (SURE) model selection.…”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Hierarchical Bayesian estimation for stationary autoregressive models using reversible jump MCMC algorithm by Suparman, S., Rusiman, Mohd Saifullah

    Published 2018
    “…The performance of the algorithm is tested by using simulated data. The test results show that the algorithm can estimate the order and coefficients of the autoregressive model very well. …”
    Get full text
    Article
  10. 10

    PSO and Linear LS for parameter estimation of NARMAX/NARMA/NARX models for non-linear data / Siti Muniroh Abdullah by Abdullah, Siti Muniroh

    Published 2017
    “…The parameter estimation step is concerned with the estimation of model parameters once the structure is known. …”
    Get full text
    Get full text
    Thesis
  11. 11

    An enhanced segment particle swarm optimization algorithm for kinetic parameters estimation of the main metabolic model of Escherichia coli by Mohammed Adam, Kunna, Tuty Asmawaty, Abdul Kadir, Muhammad Akmal, Remli, Noorlin, Mohd Ali, Kohbalan, Moorthy, Noryanti, Muhammad

    Published 2020
    “…In addition, building a kinetic model requires the estimation of the kinetic parameters, but kinetic parameters estimation in kinetic modeling is a difficult task due to the nonlinearity of the model. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12
  13. 13

    The compact genetic algorithm for likelihood estimator of first order moving average model by Al-Dabbagh, R.D., Baba, M.S., Mekhilef, Saad, Kinsheel, A.

    Published 2012
    “…In this paper compact Genetic Algorithm is used to optimize the maximum likelihood estimator of the first order moving avergae model MA(1). …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14
  15. 15

    A Model for Evaluation of Cryptography Algorithm on UUM Portal by Norliana, Abdul Majid

    Published 2004
    “…Level one is the development of userID and password, level two involve the insertion of the testing parameter speed coding. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Simulation algorithm of bayesian approach for choice-conjoint model by Zulhanif

    Published 2011
    “…As we know, the Multinomial Probit Model (MPM) is a method which assumes that chosen observations are independent but according to researchers the MPM is rarely used due to computational difficulties in computing the maximum likelihood estimates (MLE) for estimate MPM parameters. …”
    Get full text
    Thesis
  17. 17

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…Performance Testing is used to test the performance of algorithm implementations in applications. The test results show that the Boyer Moore and Knuth Morris Pratt algorithms have an accuracy rate of 100%, and the Horspool algorithm 85.3%. …”
    Get full text
    Get full text
    Journal
  18. 18

    Parameter Estimation Using Improved Differential Evolution And Bacterial Foraging Algorithms To Model Tyrosine Production In Mus Musculus(Mouse) by Jia, Xing Yeoh, Chuii, Khim Chong, Mohd Saberi, Mohamad, Yee, Wen Choon, Lian, En Chai, Safaai, Deris, Zuwairie, Ibrahim

    Published 2015
    “…The hybrid of Differential Evolution algorithm with Kalman Filtering and Bacterial Foraging algorithm is a novel global optimisation method implemented to obtain the best kinetic parameter value. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe by Yakub Kayode, Saheed, Kazeem Alagbe, Gbolagade

    Published 2017
    “…We use a parallel technique that divides RSA power process into seperate threads and employs the use of Chinese Remainder Theorem (CRT) to decrease the time required for both encryption and decryption operation. Java programming language is used to implement the algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Dynamic Robust Bootstrap Algorithm for Linear Model Selection Using Least Trimmed Squares by Uraibi, Hassan Sami

    Published 2009
    “…The Ordinary Least Squares (OLS) method is often used to estimate the parameters of a linear model. …”
    Get full text
    Get full text
    Thesis