Search Results - (( parameters verification method algorithm ) OR ( java application model algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3
  4. 4

    Real-time algorithmic music composition application. by Yap, Alisa Yi Hui

    Published 2022
    “…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  5. 5

    Failure detection analysis of grid-connected photovoltaic systems in tropical climate region / Nurmalessa Muhammad @ Atan by Muhammad @ Atan, Nurmalessa

    Published 2020
    “…Two additional sites from T&C of the FiT scheme were used for the verification of the new developed FD algorithm. These sites are in the Peninsular of Malaysia. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7
  8. 8
  9. 9

    Continuation power flow for voltage stability assessment / Mohd Zamri Laton by Laton, Mohd Zamri

    Published 2006
    “…The continuation power flow program is developed using MATLAB programming language base on algorithm of continuation power flow (CPF) technique, which can compute efficiently the parameter at saddle node bifurcation point. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11
  12. 12

    A Toolkit for Simulation of Desktop Grid Environment by FOROUSHAN, PAYAM CHINI

    Published 2014
    “…In this type of environment it is nearly impossible to prove the effectiveness of a scheduling algorithm. Hence the main objective of this study is to develop a desktop grid simulator toolkit for measuring and modeling scheduler algorithm performance. …”
    Get full text
    Get full text
    Final Year Project
  13. 13

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…The objective of this study is to enhance the confidentiality and security of the image steganography application by combining cryptography algorithm. In this proposed model, the RSA algorithm is used to encrypt a secret message into an unreadable ciphertext before hiding it in the image. …”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment by Ruzita, Ahmad

    Published 2013
    “…This thesis describes original research in the field of software quality model by presenting a Feature Ranking Algorithm (FRA) for Pragmatic Quality Factor (PQF) model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Effects of integration on the cost reduction in distribution network design for perishable products by Firoozi, Zahra, Ismail, Napsiah, Ariafar, Shahram, Tang, Sai Hong, Mohd Ariffin, Mohd Khairol Anuar, Mamariani, A.

    Published 2014
    “…To solve the integrated model, a memetic algorithm (MA) is developed in this study. For verification of the proposed algorithm, its results are compared with the results of an adapted Lagrangian relaxation heuristic algorithm from the literature. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Non-fiducial based ECG biometric authentication using one-class support vector machine by Hejazi, Maryamsadat, Syed Mohamed, Syed Abdul Rahman Al-Haddad, Hashim, Shaiful Jahari, Abdul Aziz, Ahmad Fazli, Singh, Yashwant Prasad

    Published 2017
    “…Moreover, one-class SVM can be robust recognition algorithm for ECG biometric verification if the sufficient number of biometric samples is available.…”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Parameter estimation and outlier detection for some types of circular model / Siti Zanariah binti Satari by Satari, Siti Zanariah

    Published 2015
    “…The parameters being considered in this study is the error concentration parameter. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Numerical simulation and experimental verification on distortions induced by wire-arc additive manufacturing components and costing analysis / Keval Priapratama Prajadhiana by Prajadhiana, Keval Priapratama

    Published 2024
    “…In order to minimize the computational time of numerical WAAM simulation, two method has been proposed. The first method is utilizing the lumping layering of WAAM deposition to minimize the numbers of elements and the second method is by using Inherent Strain Method (ISM) with the help of commercial finite element software MSC Marc/Mentat. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    Network game (Literati) / Chung Mei Kuen by Chung, Mei Kuen

    Published 2003
    “…Therefore, efficient and robust servers that process separate client connections in separate threads are needed. Java applet is a well-known and widely used example of mobile code (a variation on the traditional client-server model). …”
    Get full text
    Get full text
    Thesis