Search Results - (( parameter implementation re algorithm ) OR ( java application during algorithm ))
Search alternatives:
- parameter implementation »
- application during »
- implementation re »
- java application »
- during algorithm »
- re algorithm »
-
1
Removal of heavy metals from water by functionalized carbon nanotubes with deep eutectic solvents: An artificial neural network approach / Seef Saadi Fiyadh
Published 2019“…The best result achieved for Pb2+ removal using ANFIS algorithm is with RE 7.078%. For As3+ removal using different adsorbents, two algorithms were applied for the modelling, the feed-forward back-propagation maximum RE achieved is 5.97% while, the NARX algorithm achieved better accuracy with maximum RE of 5.79%. …”
Get full text
Get full text
Get full text
Thesis -
2
TDMA scheduling analysis of energy consumption for iot wireless sensor network
Published 2019“…Finally, represent the difference between experimental results and the old results of E-T-DRAND will determine if the algorithm has been efficiently re-implemented.…”
Get full text
Get full text
Thesis -
3
SUDOKU HELPER
Published 2015“…In this paper research, author presents an algorithm to provide a tutorial for any Sudoku player who got stuck during the solving process. …”
Get full text
Get full text
Final Year Project -
4
Traffic management algorithms for LEO satellite networks
Published 2016“…Those two algorithms are combined together due to the strong possibilities of being unable to achieve the optimal results when implemented separately. …”
Get full text
Get full text
Get full text
Thesis -
5
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
6
Finite element modeling and updating for dynamic study of exhaust structure
Published 2020Get full text
Get full text
Get full text
Conference or Workshop Item -
7
-
8
-
9
-
10
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
11
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
Published 2015“…This research work was limited to Java based web applications. In future research, the method can be extended to include other programming languages as well as other similar web application security vulnerabilities.…”
Get full text
Get full text
Thesis -
12
Human activity recognition via accelerometer and gyro sensors
Published 2023“…To implement the data engineering system proposed, two mobile applications, SensorData and SensorDataLogger with user-friendly interfaces and intuitive functionalities are developed using Java programming language and Android Studio. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
13
Pid-aco vibration controller with magnetorheological damper for wind turbine tower / Mahmudur Rahman
Published 2019“…When the proposed optimized PID-ACO controller is tested under different excitations frequencies and loading conditions, results show that the semi-active PID-ACO controller reduces the tower vibration up to 83% and 68% under harmonics excitation at tower 1st mode and random disturbances respectively without the needs of re-tuning the PID parameters. This is effective in preventing structural damage of the wind turbine tower due to unexpected disturbances. …”
Get full text
Get full text
Get full text
Thesis -
14
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. Ultimately, the algorithm development program designed earlier is linked up directly to the robotic model for program implementation and verification. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
16
Online auto-tuned proportional-integral controller using particle swarm optimization for dual active bridge DC-DC converter
Published 2021“…Ultimately, an online auto-tuned PI using PSO (OPSO-PI) was proposed to produce higher robustness than the APSO-PI. The OPSO-PI with re-tuning approach allows the update process of Kp and Ki parameters concerning the system change. …”
Get full text
Get full text
Thesis -
17
