Search Results - (( parallel directly learning algorithm ) OR ( java application based algorithm ))
Search alternatives:
- learning algorithm »
- directly learning »
- application based »
- java application »
-
1
Fast and efficient sequential learning algorithms using direct-link RBF networks
Published 2003“…Novel fast and efficient sequential learning algorithms are proposed for direct-link radial basis function (DRBF) networks. …”
Get full text
Get full text
Book Section -
2
PMT : opposition based learning technique for enhancing metaheuristic algorithms performance
Published 2020“…Nonetheless, OBL-based solutions often consider one particular direction of the opposition. Considering only one direction can be problematic as the best solution may come in any of a multitude of directions. …”
Get full text
Get full text
Thesis -
3
Design and implementation of a real-time adaptive learning algorithm controller for a 3-DOF parallel manipulator / Mustafa Jabbar Hayawi
Published 2015“…An electronic board, transistor relay driver circuit, is designed for the purpose of establishing communication interface between the computer, adaptive learning algorithm and the actuator mechanism. Design and development an adaptive learning algorithm controller ALAC of position the actuators is presented in real time parallel manipulator based on artificial neural network ANN. …”
Get full text
Get full text
Thesis -
4
Computationally efficient sequential learning algorithms for direct link resource-allocating networks
Published 2005“…Computationally efficient sequential learning algorithms are developed for direct-link resource-allocating networks (DRANs). …”
Get full text
Get full text
Article -
5
PMT: opposition-based learning technique for enhancing meta-heuristic performance
Published 2019“…Addressing these issues, this research proposes a new general opposition-based learning (OBL) technique inspired by a natural phenomenon of parallel mirrors systems called the parallel mirrors technique (PMT). …”
Get full text
Get full text
Get full text
Article -
6
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
7
Parallel CFD Simulations of Multiphase Systems: Jet into a Cylindrical Bath and Rotary Drum on a Rectangular Bath.
Published 2001“…For commercial CFD packages, in many cases the solution algorithms are black boxes, even though parallel computing helps in many cases to overcome the limitations, as shown here. …”
Get full text
Get full text
Article -
8
A study of the high-performance computing parallelism in solving complexity of meteorology data and calculations
Published 2024“…Our investigation elaborates on, identifies, and analyzes the features and characteristics of parallel computing that are utilized in it. The paper also focuses on examining parallelization modeling, the algorithms involved, and optimization strategies employed in HPC-enabled meteorological simulations. …”
Get full text
Get full text
Get full text
Article -
9
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
10
Application of genetic algorithm and JFugue in an evolutionary music generator
Published 2025“…This project explores the application of Genetic Algorithms (GA) with JFugue, which is a Java-based music programming library to develop an Evolutionary Music Generator. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
11
-
12
-
13
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
15
Real-time algorithmic music composition application.
Published 2022“…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
16
Neuro Symbolic Integration and Agent Based Modelling
Published 2018“…The major domain of neuro-symbolic integration is designed by the theory are usually known as deductive systems which less such elements of human reasoning as adaptation, learning and self-organisation. Meanwhile, neural networks, known as a mathematical model of neurons in the human brain, and have various abilities, and moreover, they also provide parallel computations and therefore can perform some calculations quicker than classical learning algorithms. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…A design proposal was outlined to provide an adaptive client/server approach to stream audio contents using Real-Time Transport Protocol (RTP) involving architecture based on the Java Media Framework (JMF) Application Programmable Interfaces (API).RTP protocol is the Internet-standard protocol for the transport of real-time data, including audio and video and can be implemented by using Java Media Framework (JMF). …”
Get full text
Get full text
Thesis -
18
A Toolkit for Simulation of Desktop Grid Environment
Published 2014“…The selected methodology for the application development is based on prototyping methodology. …”
Get full text
Get full text
Final Year Project -
19
-
20
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item
