Search Results - (( java implementation models algorithm ) OR ( parametric optimization techniques algorithm ))

Refine Results
  1. 1

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Provider independent cryptographic tools by Ibrahim, Subariah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
    Get full text
    Get full text
    Get full text
    Monograph
  3. 3

    An intelligent framework for modelling and active vibration control of flexible structures by Mohd. Hashim, Siti Zaiton

    Published 2004
    “…The first controller design is formulated so as to allow on-line modeling, controller design and implementation and thus, yield a self-tuning control algorithm. Performance of the AVC algorithm is assessed based on parametric design techniques, using RLS and GAS, and non-parametric design techniques, using MLP-NN and ANFIS in the suppression of vibration of the flexible structures. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    Experimental dataset to develop a parametric model based of DC geared motor in feeder machine by Azlan, W. M, Salleh, S. M, Mahzan, S, Sadikin, A, Ahmad, S

    Published 2019
    “…This paper presents the application of a System Identification based on Particle Swarm Optimization (PSO) technique to develop parametric model of experimental dataset of DC geared motor in feeder machine. …”
    Get full text
    Get full text
    Article
  7. 7

    Effect of input variables selection on energy demand prediction based on intelligent hybrid neural networks by Islam, B., Baharudin, Z., Nallagownden, P.

    Published 2015
    “…A hybrid approach that combines ANN and an evolutionary optimization technique, genetic algorithm (GA) is used for the development of a short term load forecast (STLF) model. …”
    Get full text
    Get full text
    Article
  8. 8
  9. 9
  10. 10
  11. 11

    Optimization of blood vessel detection in retina images using multithreading and native code for portable devices by Tran, Duc Ngoc, Hussin, Fawnizu Azmadi, Yusoff, Mohd Zuki

    Published 2013
    “…The performance of Java programming model and native programming model are compared with respect to the execution time for blood vessel detection. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Performance Analysis of ARMA based Magnetic Resonance Imaging (MRI) Reconstruction Algorithm by Salami, Momoh Jimoh Emiyoka, Najeeb, Athaur Rahman

    Published 2012
    “…Despite this success, two problems lessen the use of this technique, these are: non availability of optimal method of estimating model order and the model coefficients determination. …”
    Get full text
    Get full text
    Monograph
  13. 13

    A MODIFIED PARTICLE SWARM OPTIMIZATION ALGORITHM FOR WELLBORE TRAJECTORY DESIGN by BISWAS, KALLOL

    Published 2021
    “…To address this issue, a new hybridization of cellular automata (CA) technique with grey wolf optimization (GWO) and particle swarm optimization (PSO) algorithms is proposed in this work which solves these three optimization objectives of drilling through 17 tuning variables. …”
    Get full text
    Get full text
    Thesis
  14. 14

    A Toolkit for Simulation of Desktop Grid Environment by FOROUSHAN, PAYAM CHINI

    Published 2014
    “…A simulator for desktop grid environment has been developed using Java as the implementation language due to its wide popularity. …”
    Get full text
    Get full text
    Final Year Project
  15. 15

    Reliability Analysis and Prediction of Time to Failure Distribution of an Automobile Crankshaft by Salvinder Singh, Karam Singh, Shahrum, Abdullah, Nik Abdullah, Nik Mohamed

    Published 2015
    “…T, the algorithm has the capability to statistically validate the algorithm to obtain the optimal parametric model to represent the failure of the component against the actual time to failure data from the local automobile industry. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Design and implementation of an optimal fuzzy logic controller using genetic algorithm by Khan, Sheroz, Abdulazeez, Salami Femi, Adetunji, Lawal Wahab, Alam, A. H. M. Zahirul, Salami, Momoh Jimoh Emiyoka, Hameed, Shihab A., Hassan Abdalla Hashim, Aisha, Islam, Mohd Rafiqul

    Published 2008
    “…Said approach was first simulated using MATLAB/SIMULINK using the techniques of Proportional Derivative Fuzzy Logic Controller (PD-FLC) whose membership function, fuzzy logic rules and scaling gains were optimized by the genetic algorithm technique. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    A Model for Evaluation of Cryptography Algorithm on UUM Portal by Norliana, Abdul Majid

    Published 2004
    “…The methodology used in this study begun with problem identification, requirement identification, analysed the model process and design the simulation model. The simulation model was developed using Active Server Page, JavaScript and SQL 7.0 as database. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20