Search Results - (( java implementation new algorithm ) OR ( parameter solution matching algorithm ))
Search alternatives:
- java implementation »
- implementation new »
- parameter solution »
- new algorithm »
- matching »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
Combining Recursive Least Square and Principal Component Analysis for Assisted History Matching
Published 2014“…History matching is a process of altering parameters in a reservoir simulator in order to match production performance with observed historical data. …”
Get full text
Get full text
Final Year Project -
3
Artificial neural network and inverse solution method for assisted history matching of a reservoir model
Published 2017“…A typical inverse problem encountered in petroleum industries is referred to as history matching. In the early days, history matching was undertaken by manually changing sensitive reservoir parameters until a reasonable match between observed and simulated pressure and production data are obtained. …”
Get full text
Get full text
Article -
4
An Improved Hybrid of Particle Swarm Optimization and the Gravitational Search Algorithm to Produce a Kinetic Parameter Estimation of Aspartate Biochemical Pathways
Published 2017“…Although the model itself can potentially match a set of experimental data, a high-performance estimation algorithm is required to improve the quality of the solutions. …”
Get full text
Get full text
Get full text
Article -
5
-
6
Application of genetic algorithm and JFugue in an evolutionary music generator
Published 2025“…This project explores the application of Genetic Algorithms (GA) with JFugue, which is a Java-based music programming library to develop an Evolutionary Music Generator. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
7
-
8
Measuring height of high-voltage transmission poles using unmanned aerial vehicle (UAV) imagery
Published 2017“…Results were compared with well-known algorithms; including, for example, global and local stereo matching algorithms. …”
Get full text
Get full text
Article -
9
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. …”
Review -
10
Fitness value based evolution algorithm approach for text steganalysis model
Published 2013“…In this paper, we present a new alternative method for text steganalysis based on an evolution algorithm, implemented using the Java Evolution Algorithms Package (JEAP).The main objective of this paper is to detect the existence of hidden messages ased on fitness values of a text description.It is found that the detection performance has been influenced by two groups of fitness values which are good fitness value and bad fitness value. …”
Get full text
Get full text
Article -
11
Classification System for Heart Disease Using Bayesian Classifier
Published 2007“…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
Get full text
Get full text
Thesis -
12
Development of Graphical User Interface (GUI) for Antenna Design
Published 2016“…This project involves four main phases, which is the theoretical modeling of antenna, critical review design of antenna, implementation of synthesis algorithm of antenna and the GUI development. The methodology of this project involved the selection of antenna types to design, computation of antenna parameters, analysis of antenna performance and lastly end with the impedance matching solution. …”
Get full text
Get full text
Final Year Project -
13
Biometrics electronic purse
Published 1999“…This paper looked into using biometrics as a mean of authentication, thus requiring a new generation of Smart Card technology to be implemented in banking and multiple applications environment. …”
Get full text
Get full text
Get full text
Proceeding Paper -
14
-
15
Priority and dynamic quantum time algorithms for central processing unit scheduling
Published 2018“…The proposed algorithms (Priority Dynamic Quantum Time and Multi Priority Dynamic Quantum Time Algorithms) are implemented using JAVA programming language and validated using Key Performance Indicators equations. …”
Get full text
Get full text
Thesis -
16
The effect of key parameters on the design of an optimized CAES power plant
Published 2017“…Among all, Compressed air energy storage (CAES) technology has proposed itself as a reliable and efficient solution to match the two sides. This paper deals with a modeled compressed air energy storage power plant which has been optimized thermodynamically through an efficient genetic algorithm code. …”
Get full text
Get full text
Article -
17
Face recognition and identification system (FaceRec) / Khew Jye Huei
Published 2004“…It describes the implementation and functions of a working system that performs the recognition and identification of human faces using the implement algorithms. …”
Get full text
Get full text
Thesis -
18
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
19
An advanced scheme based on Artificial Intelligence technique for solving nonlinear Riccati systems
Published 2024“…Numerical results demonstrate that the proposed method not only closely matches the exact solutions and reference solutions but also is more accurate than other existing methods. © The Author(s) under exclusive licence to Sociedade Brasileira de Matemática Aplicada e Computacional 2024.…”
Get full text
Get full text
Article -
20
Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
Published 2009“…For this reason, the task of this paper becomes difficult. In this paper a new method is implementing to hide a file of unused area 2 within .EXE file and to detect the hidden file. …”
Get full text
Get full text
Get full text
Article
