Search Results - (( square evaluation method algorithm ) OR ( java application using algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2
  3. 3
  4. 4

    Simulation of fast recursive least square algorithm for echo cancellation system by Kamaruddin, Rosita

    Published 2003
    “…The performance of FRLS algorithm for both filters is described and evaluated by using MATLAB software .. …”
    Get full text
    Get full text
    Student Project
  5. 5

    Detection of multiple outliners in linear regression using nonparametric methods by Adnan, Robiah

    Published 2004
    “…Method 1 is a modification of Sebert’s method where the list squares (LS) fit is replaced by the least median of squares (LMS) fit while Method 2 is a modification of Sebert’s method where the least squares (LS) fit is replaced by the least trimmed of squares (LTS) fit. …”
    Get full text
    Get full text
    Monograph
  6. 6

    Model selection approaches of water quality index data by Kamarudin, Nur Azulia, Ismail, Suzilah

    Published 2016
    “…In order to select the best model, it is vital to ensure that proper estimation method is chosen in the modelling process.Different estimators have been proposed for the estimation of parameters of a model, including the least square and iterative estimators.This study aims to evaluate the forecasting performances of two algorithms on water quality index (WQI) of a river in Malaysia based on root mean square error (RMSE) and geometric root mean square error (GRMSE).Feasible generalised least squares (FGLS) and iterative maximum likelihood (ML) estimation methods are used in the algorithms, respectively.The results showed that SUREMLE-Autometrics has surpassed SURE-Autometrics; another simultaneous selection procedure of multipleequation models.Two individual selections, namely Autometrics-SUREMLE and Autometrics-SURE, though showed consistency only for GRMSE.All in all, ML estimation is a more appropriate method to be employed in this seemingly unrelated regression equations (SURE) model selection.…”
    Get full text
    Get full text
    Get full text
    Article
  7. 7
  8. 8

    Heartbeat Anomaly Detection Method Based on Electrocardiogram using Improved Certainty Cognitive Map by Sumiati, .

    Published 2023
    “…The test results of the MCM Method gave a Mean Squared Error (MSE) of 0.65 and Root Mean Squared Error (RMSE) of 0.80 and the test results of the CCM Method with a Mean Squared Error (MSE) of 0.15 and a Root Mean Squared Error (RMSE) of 0.39. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Real-Time Video Processing Using Native Programming on Android Platform by Saipullah, Khairul Muzzammil

    Published 2012
    “…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10
  11. 11
  12. 12

    Implementation of Evolutionary Algorithms to Parametric Identification of Gradient Flexible Plate Structure by Annisa, Jamali, Lidyana, Roslan, Muhammad Hasbollah, Hassan

    Published 2023
    “…The obtained results were then compared with the conventional method that is recursive least square (RLS). The developed models were evaluated based on the lowest mean square error (MSE), within the 95% confidence level of both auto and cross-correlation tests as well as high stability in the pole-zero diagram. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Extended multiple models selection algorithms based on iterative feasible generalized least squares (IFGLS) and expectation-maximization (EM) algorithm by Nur Azulia, Kamarudin

    Published 2019
    “…Therefore, in this study SUREAutometrics is improvised using two MLE methods, which are iterative feasible generalized least squares (IFGLS) and expectation-maximization (EM) algorithm, named as SURE(IFGLS)-Autometrics and SURE(EM)-Autometrics algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Real-time algorithmic music composition application. by Yap, Alisa Yi Hui

    Published 2022
    “…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  15. 15

    Performance evaluation of real-time multiprocessor scheduling algorithms by Alhussian, H., Zakaria, N., Abdulkadir, S.J., Fageeri, S.O.

    Published 2016
    “…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16
  17. 17

    Application of genetic algorithm and JFugue in an evolutionary music generator by Tang, Jia Rou

    Published 2025
    “…This project explores the application of Genetic Algorithms (GA) with JFugue, which is a Java-based music programming library to develop an Evolutionary Music Generator. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  18. 18

    Adaptive filtering of EEG/ERP through bounded range artificial Bee Colony (BR-ABC) algorithm by Ahirwal, M.K., Kumar, A., Singh, G.K.

    Published 2014
    “…ANCs are also implemented with Least Mean Square (LMS) and Recursive Least Square (RLS) algorithm. …”
    Get full text
    Get full text
    Article
  19. 19

    Development of an Image Encryption Algorithm using Latin Square Matrix and Logistics Map by Emmanuel Oluwatobi Asani, Godsfavour Biety-Nwanju, Abidemi Emmanuel Adeniyi, Salil Bharany, Ashraf Osman Ibrahim Elsayed, Anas W. Abulfaraj, Wamda Nagmeldin

    Published 2023
    “…The issue of misplaced pixel positions in the image was also adequately addressed, making it an effective method for image encryption. The hybrid technique was simulated on image data and evaluated to gauge its performance. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20