Search Results - (( program packaging methods algorithm ) OR ( java application during algorithm ))
Search alternatives:
- application during »
- program packaging »
- methods algorithm »
- java application »
- during algorithm »
-
1
Development of a building energy analysis package (BEAP) and its application to the analysis of cool thermal energy storage systems
Published 2001“…The new package is also verified using a commercial program. …”
Get full text
Get full text
Thesis -
2
Mould Filling In Electronic Packaging
Published 2005“…Characteristic Based Split (CBS) method is utilized in this program to analyze and model the fluid flow in a single cavity mold of the encapsulation process. …”
Get full text
Get full text
Monograph -
3
Progressive damage analysis of composite layered plates using a mesh reduction method
Published 2006“…A progressive damage methodology and algorithm for composite laminates was successfully developed for the new finite strip methods using stress-based failure criteria. …”
Get full text
Get full text
Conference or Workshop Item -
4
Path planning algorithm for a car like robot based on MILP method
Published 2013“…This has been combined with collision avoidance constraints to form a mixed integer linear program, which can be solved by a commercial software package.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
SUDOKU HELPER
Published 2015“…In this paper research, author presents an algorithm to provide a tutorial for any Sudoku player who got stuck during the solving process. …”
Get full text
Get full text
Final Year Project -
6
Comparison Of Phylogenetic Trees Using Difference Distance Function Method
Published 2005“…The phylogenetic tree is build using the PHYLlP (the PHYlogeny Inference Package), a package of programs for inferring phylogenies (evolutionary trees). …”
Get full text
Get full text
Final Year Project Report / IMRAD -
7
A study on solution of matrix riccati differential equations using ant colony programming and simulink / Mohd Zahurin Mohamed Kamali
Published 2015“…In this thesis, we implement the modified ant colony programming (ACP) algorithm for solving the matrix Riccati differential equation (MRDE). …”
Get full text
Get full text
Thesis -
8
Statistical approach on grading: mixture modeling
Published 2006“…A solution to this problem is using the Markov Chain Monte Carlo method namely Gibbs sampler algorithm. The Gibbs sampler algorithm is applied using the WinBUGS programming package. …”
Get full text
Get full text
Thesis -
9
The use of Cox regression and genetic algorithm (CoRGA) for identifying risk factors for mortality in older people
Published 2004“…This is partly because traditional statistical methods and software packages allow a restricted number of variables and combinations of variables. …”
Get full text
Get full text
Get full text
Article -
10
Network reconfiguration and control for loss reduction using genetic algorithm
Published 2010“…Two methods of load flow solution with different accuracy are employed, i.e., simplified method, which uses the approximation of P and Q at the start of the implemented program, and fast-decoupled method, which gives an exact solution. …”
Get full text
Get full text
Thesis -
11
Parallel Implementation Of Field Visualizations With High Order Tetrahedral Finite Elements
Published 2013“…The method builds upon an approach of the open source visualization software VTK where the data visualizer program ParaView is freely available. …”
Get full text
Get full text
Thesis -
12
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
13
Progressive failure analysis of composite laminated stiffened plates using the finite strip method
Published 2009“…A progressive failure algorithm for composite laminates has been successfully developed for the new finite strip methods using a stress-based failure criterion, Tsai–Wu. …”
Get full text
Get full text
Get full text
Article -
14
-
15
An ensemble deep learning classifier stacked with fuzzy ARTMAP for malware detection
Published 2023“…However, legacy anti-malware methods are confronted with millions of potential malicious programs. …”
Get full text
Get full text
Get full text
Article -
16
-
17
A novel large-bit-size architecture and microarchitecture for the implementation of Superscalar Pipeline VLIW microprocessors
Published 2008“…Both methods have its advantages and disadvantages. Both methods yields different design issues and have different engineering limitations. …”
Get full text
Thesis -
18
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
19
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
Published 2015“…This research work was limited to Java based web applications. In future research, the method can be extended to include other programming languages as well as other similar web application security vulnerabilities.…”
Get full text
Get full text
Thesis -
20
Human activity recognition via accelerometer and gyro sensors
Published 2023“…To implement the data engineering system proposed, two mobile applications, SensorData and SensorDataLogger with user-friendly interfaces and intuitive functionalities are developed using Java programming language and Android Studio. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis
