Search Results - (( parameter extraction based algorithm ) OR ( java application model algorithm ))
Search alternatives:
- parameter extraction »
- application model »
- extraction based »
- java application »
- model algorithm »
-
1
-
2
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
3
Individual-tree segmentation and extraction based on LiDAR point cloud data
Published 2024“…The objective was to identify the optimal parameters for both algorithms in terms of tree height extraction precision. …”
Get full text
Get full text
Get full text
Article -
4
Parameter extraction of photovoltaic module using hybrid evolutionary algorithm
Published 2023Conference Paper -
5
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
6
Novel parameter extraction for single, double, and three diodes photovoltaic models based on robust adaptive arithmetic optimization algorithm and adaptive damping method of Berndt-Hall-Hall-Hausman
Published 2022“…In this work, we present a robust adaptive Arithmetic Optimization Algorithm based on the adaptive damping Berndt-hall-hall-Hausman (RaAOAAdBHHH) approach to efficacity determine the parameters of the single, double, and three diode PV model. …”
Get full text
Get full text
Article -
7
Real-time algorithmic music composition application.
Published 2022“…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
8
-
9
-
10
Parameter extraction of single, double, and three diodes photovoltaic model based on guaranteed convergence arithmetic optimization algorithm and modified third order Newton Raphson methods
Published 2022“…Extraction of the photovoltaic (PV) model parameters is critical for forecasting these systems’ energy output. …”
Get full text
Get full text
Article -
11
-
12
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
13
A Rule Extraction Algorithm That Scales Between Fidelity and Comprehensibility
Published 2012“…Since the needs of comprehensibility or fidelity may vary depending on the user or application, this paper presented a significance based rule extraction algorithm that allows a user set parameter to scale between the desired degree of fidelity and comprehensibility of the rules extracted. …”
Get full text
Get full text
Get full text
Article -
14
-
15
-
16
Feature extraction and selection algorithm based on self adaptive ant colony system for sky image classification
Published 2023“…Therefore, an improved feature extraction and selection for sky image classification (FESSIC) algorithm is proposed. …”
Get full text
Get full text
Get full text
Thesis -
17
-
18
A Toolkit for Simulation of Desktop Grid Environment
Published 2014“…In this type of environment it is nearly impossible to prove the effectiveness of a scheduling algorithm. Hence the main objective of this study is to develop a desktop grid simulator toolkit for measuring and modeling scheduler algorithm performance. …”
Get full text
Get full text
Final Year Project -
19
A novel theoretical and practical methodology for extracting the parameters of the single and double diode Photovoltaic models
Published 2022“…Therefore, this paper presents a unique approach known as Hybridized Arithmetic Operation Algorithm based on Efficient Newton Raphson (HAOA ENR ) to experimentally extract the parameters of the single-diode and double-diode PV models at the variability of the climatic changes. …”
Get full text
Get full text
Article -
20
Secure Image Steganography Using Encryption Algorithm
Published 2016“…The objective of this study is to enhance the confidentiality and security of the image steganography application by combining cryptography algorithm. In this proposed model, the RSA algorithm is used to encrypt a secret message into an unreadable ciphertext before hiding it in the image. …”
Get full text
Get full text
Conference or Workshop Item
