Search Results - (( parameters validation study algorithm ) OR ( java application designing algorithm ))
Search alternatives:
- parameters validation »
- application designing »
- designing algorithm »
- java application »
-
1
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…Level one is the development of userID and password, level two involve the insertion of the testing parameter speed coding. The methodology used in this study begun with problem identification, requirement identification, analysed the model process and design the simulation model. …”
Get full text
Get full text
Get full text
Thesis -
2
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
3
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
4
-
5
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…Java Media Framework library and the RTP protocol for audio transmission were used as development tools.The developed system designed in this thesis together with experimental results proved that the system could be implemented successfully. …”
Get full text
Get full text
Thesis -
6
-
7
Characterization of PV panel and global optimization of its model parameters using genetic algorithm
Published 2023“…The accurate modeling of any PV module is incumbent upon the values of these parameters, as it is imperative in the context of any further studies concerning different PV applications. …”
Article -
8
Characterization of PV panel and global optimization of its model parameters using genetic algorithm
Published 2013“…The accurate modeling of any PV module is incumbent upon the values of these parameters, as it is imperative in the context of any further studies concerning different PV applications. …”
Get full text
Get full text
Article -
9
Modelling and control of heat exchanger by using bio-inspired algorithm
Published 2014“…In this study, data from heat exchanger experiment was used to determine the parameter of ARMAX equation and by using GA and PSO, all the parameters were optimized. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
Hybrid ACO and SVM algorithm for pattern classification
Published 2013“…This study presents four algorithms for tuning the SVM parameters and selecting feature subset which improved SVM classification accuracy with smaller size of feature subset. …”
Get full text
Get full text
Get full text
Thesis -
11
Parameter estimation of tapioca starch hydrolysis process: application of least squares and genetic algorithm
Published 2005“…The performance of genetic algorithm (GA) in nonlinear kinetic parameter estimation of topiaca starch hydrolysis was studied and compared with Gauss-Newton method. …”
Get full text
Get full text
Get full text
Article -
12
-
13
-
14
Design Of Robot Motion Planning Algorithm For Wall Following Robot
Published 2006Get full text
Get full text
Monograph -
15
OPTIMIZATION OF PID CONTROLLER PARAMETERS USING ARTIFICIAL FISH SWARM ALGORITHM
Published 2013“…The results found in the study shows that the optimization is valid and effective.…”
Get full text
Get full text
Final Year Project -
16
Network game (Literati) / Chung Mei Kuen
Published 2003“…The main aspect of this thesis is to produce a networked gaming system, which process players. requested to play the game and enabling users to play the graphical game with people through the network. The algorithm design and implementation method must not only be workable, but also highly efficient in terms of execution speed and response time. …”
Get full text
Get full text
Thesis -
17
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The application is designed to satisfy the user friendly interfaces and intent to be used by the end user without having the advanced knowledge in mobile security. …”
Get full text
Get full text
Conference or Workshop Item -
18
-
19
Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak
Published 2019“…The fourth stage is to design evaluation methodology of Max-Min Rule-Based Classification Algorithm using classifier model. Finally, both algorithms are validated against the findings in various literatures. …”
Get full text
Get full text
Thesis -
20
Optimization of milling parameters using ant colony optimization
Published 2008“…The result obtained from this simulation will compare with another method like Genetic Algorithm (GA) and Linear Programming Technique (LPT) to validation. …”
Get full text
Get full text
Undergraduates Project Papers
