Search Results - (( java implementation mechanism algorithm ) OR ( parameter estimation task algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The key is the trigger mechanism to the algorithm. Until the advent of the Internet, encryption was rarely used by the public, but was largely a military tool. …”
    Get full text
    Get full text
    Final Year Project
  2. 2
  3. 3

    An enhanced segment particle swarm optimization algorithm for kinetic parameters estimation of the main metabolic model of Escherichia coli by Mohammed Adam, Kunna, Tuty Asmawaty, Abdul Kadir, Muhammad Akmal, Remli, Noorlin, Mohd Ali, Kohbalan, Moorthy, Noryanti, Muhammad

    Published 2020
    “…In addition, building a kinetic model requires the estimation of the kinetic parameters, but kinetic parameters estimation in kinetic modeling is a difficult task due to the nonlinearity of the model. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Estimation Of Weibull Parameters Using Simulated Annealing As Applied In Financial Data by Hamza, Abubakar

    Published 2023
    “…However, the selection of the most suitable estimators is still a challenging task. The present study proposes a simulated annealing algorithm (SA) in estimating the parameters of Weibull distribution with application to modified internal rate of return data (MIRR).The objective is to examine the investment potential of the shari’ah compliance companies of the Malaysia property sector (MPS). …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    Finite impulse response optimizers for solving optimization problems by Ab Rahman, Tasiransurini

    Published 2019
    “…Selecting optimal parameters’ values may improve an algorithm’s performance. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Finite impulse response optimizers for solving optimization problems by Tasiransurini, Ab Rahman

    Published 2019
    “…Selecting optimal parameters’ values may improve an algorithm’s performance. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Voltage and load profiles estimation of distribution network using independent component analysis / Mashitah Mohd Hussain by Mohd Hussain, Mashitah

    Published 2014
    “…Initially, the research focuses on three main tasks. First, voltage profile on source distribution system is estimated. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10
  11. 11

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The correctness of the proposed protocol is demonstrated in a simulation model developed in JAVA TCP/IP socket. Next, the proposed protocol is implemented in RFID system including IAIK UHF Demo tag, TagSense Nano-UHF reader and back-end database. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Parametric coefficient genetic algorithm for domestic water consumption / Nurul Nadia Hani by Hani, Nurul Nadia

    Published 2019
    “…Accurately and effectively estimating and classifying the amount of residential water consumption is a tremendously challenging task as these parameters differ from one another with one household routine may be more influential and vice versa. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Implementation of RIO in UMJaNetSim / Chan Chin We by Chan, Chin We

    Published 2004
    “…In this project, I will do some research on the recent TCP congestion control and avoidance mechanisms and implement one of the mechanisms into the Java Network Simulator (JaNetSim). …”
    Get full text
    Get full text
    Thesis
  14. 14

    Multi-Agent cubature Kalman optimizer: A novel metaheuristic algorithm for solving numerical optimization problems by Zulkifli, Musa, Zuwairie, Ibrahim, Mohd Ibrahim, Shapiai

    Published 2024
    “…CTT can use small values for parameters P(0), Q, and R, so CKF was developed to overcome KF and other estimation algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. …”
    Review
  16. 16

    Restoration of blurred images using geometric and chebichef moments / Ahlad Kumar by Ahlad, Kumar

    Published 2016
    “…In the third method, Tchebichef moments (TM) of low order are selected as features used as inputs to ELM to estimate the Gaussian blur parameters. Once the blur parameters are estimated, image restoration of the proposed method is carried out using split Bregman algorithm. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Processing time estimation in precision machining industry using AI / Lim Say Li by Lim, Say Li

    Published 2017
    “…An AI approach for processing time estimation by implementing desired input parameters and machining data is tested and completed. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Individual-tree segmentation and extraction based on LiDAR point cloud data by Liu, Xiaofeng, Abdullah, Muhamad Taufik, Mustaffa, Mas Rina, Nasharuddin, Nurul Amelina

    Published 2024
    “…In the task of individual tree extraction, the point cloud distance discriminant clustering algorithm outperformed the watershed algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Evaluating power efficient algorithms for efficiency and carbon emissions in cloud data centers: a review by Uddin, Mueen, Darabidarabkhani, Yasaman, Shah, Asadullah, Memon, Jamshed

    Published 2015
    “…CloudSim simulator is used to implement the algorithms on an IaaS cloud infrastructure, to calculate the power consumption, and to analyze each algorithm's behavior for different parameters. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Intelligent adaptive active force control of a robotic arm with embedded iterative learning algorithms by Mailah, Musa, Ong, Miaw Yong

    Published 2001
    “…These parameters are adaptively computed on-line while the robot is executing a trajectory tracking task and subject to some forms of external disturbances. …”
    Get full text
    Get full text
    Get full text
    Article