Search Results - (( using value _ algorithm ) OR ( java application optimisation algorithm ))
Search alternatives:
- application optimisation »
- optimisation algorithm »
- java application »
-
1
Web-based expert system for material selection of natural fiber- reinforced polymer composites
Published 2015“…Secondly, an expert system using Java programming technology with two tiers of search engine was developed to perform a fast selection of candidate materials in huge volume. …”
Get full text
Get full text
Thesis -
2
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
Get full text
Get full text
Get full text
Article -
3
Enhance key generation algorithm based user string identity as public key
Published 2015“…Only odd decimal values can be used in a public key using the Tripathi algorithm. …”
Get full text
Get full text
Thesis -
4
Enhanced Adaptive Confidence-Based Q Routing Algorithms For Network Traffic
Published 2004“…In CQ Routing Algorithm, the confidence value (C value) can be used to improve the quality of exploration in Q Routing Algorithm. …”
Get full text
Get full text
Thesis -
5
An adaptive routing algorithm: enhanced confidence-based Q routing algorithm in network traffic
Published 2004“…CQ Routing Algorithm evaluates how confidence value (C value) can be used to improve the quality of exploration in Q Routing Algorithm for adaptive packet routing in communication networks. …”
Get full text
Get full text
Get full text
Article -
6
Extensions to the K-AMH algorithm for numerical clustering
Published 2018“…The original k-AMH algorithm for categorical values uses a simple matching dissimilarity measure, but for numerical values it uses Euclidean distance. …”
Get full text
Get full text
Get full text
Article -
7
Data depublication using : Hashing algorithm / Naimah Nayan
Published 2019“…This method basically will help to improve the storage capacity and efficiency. The hash value is generated by using hashing algorithm such as Message Digest 5 (MD5) and Secure Hashing Algorithm 1 (SHA-1). …”
Get full text
Get full text
Thesis -
8
Enhancing latent semantic analysis (LSA) using tagging algorithm in retrieving Malay documents / Afiqah Bazlla Md Soom
Published 2018“…Outcomes of this study indicate that by using tagging algorithm, the recall value of the LSA algorithm can be enhanced up to 4% , the precision value also can be enhanced up to 16% and the F-measure value of LSA retrieval result can be enhanced by approximately up to 7% compared to LSA retrieval result without tagging algorithm. …”
Get full text
Get full text
Thesis -
9
Taguchi-Grey Relational Analysis Method for Parameter Tuning of Multi-objective Pareto Ant Colony System Algorithm
Published 2023“…These values can be benchmarked in solving multi-objective GMS problems using the multi-objective PACS algorithm and its variants.…”
Get full text
Get full text
Get full text
Article -
10
The effect of dose calculation algorithms on the normal tissue complication probability values of thoracic cancer
Published 2015“…Four treatment plans are created and DVHs are evaluated based on criteria of acceptance level. NTCP values for thorax plan one and two are evaluated by using different algorithm. …”
Get full text
Get full text
Monograph -
11
Modeling of widely-linear quaternion valued systems using hypercomplex algorithms
Published 2015“…The data-driven optimal modeling and identification of widely-linear quaternion-valued synthetic systems is achieved by using a quaternion-valued gradient based algorithms. …”
Get full text
Get full text
Conference or Workshop Item -
12
Marketplace product recommendation using collaborative filter / Muhammad Alif Fauzan Ismail
Published 2021“…The algorithm used to develop a product recommendation engine is collaborative filtering algorithm and this algorithm is written in python. …”
Get full text
Get full text
Thesis -
13
Facial Drowsiness Signs Detection Algorithm Using Image Processing Techniques For Various Lighting Condition
Published 2017“…In this project, the algorithm is developed based on four main algorithms which are the detection algorithm, the tracking algorithm, the preprocessing algorithm and the drowsiness signs analysis algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
14
Optimization of fast fourier transform based on twiddle factor using genetic algorithm on raspberry pi
Published 2019“…However, both Signal to Noise Ratio (SNR) and Switching Activity (SA) values depend on the word length of the FFT processor, the bigger the word length of the FFT processor will result in a higher value for the SNR and the SA, Thus, this research aims to reduce the power consumption of the FFT processor by lowering the word length of Twiddle Factor for the FFT by using both Single Objective Genetic Algorithm (SOGA) and Multi-Objective Genetic Algorithm (MOGA) to find the optimum results for SNR and SA values while lowering the Word Length. …”
Get full text
Get full text
Thesis -
15
Shunt active power filter using hybrid fuzzy-proportional and crisp-integral control algorithms for total harmonic distortion improvement
Published 2016“…Other than that, the proposed HFP+CI current control algorithms has resulted better performance with the lowest current ripple, Total Harmonic Distortion (THD) values, and power loss than using Fuzzy-PI and Crisp-PI current control algorithms. …”
Get full text
Get full text
Thesis -
16
Pemetaan Pm10 Dan Aot Menggunakan Teknik Penderiaan Jauh Di Semenanjung Malaysia
Published 2006“…The proposed algorithms were used to generate PM10 and AOT maps for the study areas. …”
Get full text
Get full text
Thesis -
17
Application of a simple mono window land surface temperature algorithm from landsat ETM+ over al Qassim, Saudi Arabia
Published 2012“…The surface emissivity values were computed based on the NDVI values. The LST values derived from ATCOR2_T in the PCI Geomatica image processing software was used for algorithm calibration. …”
Get full text
Get full text
Get full text
Article -
18
Widely linear dynamic quaternion valued least mean square algorithm for linear filtering
Published 2017“…A superior performance is achieved by the proposed algorithms in system modeling where the DQLMS was able to track the correct weights values of the different modeled systems 430 sample faster than the QLMS and ZA-QLMS algorithms while the WL-DQLMS was faster than the WLQLMS algorithm by 950 samples. …”
Get full text
Get full text
Get full text
Thesis -
19
An algorithm for positive solution of boundary value problems of nonlinear fractional differential equations by Adomian decomposition method
Published 2016“…In the proposed algorithm the boundary conditions are used to convert the nonlinear fractional differential equations to an equivalent integral equation and then a recursion scheme is used to obtain the analytical solution components without the use of undetermined coefficients. …”
Get full text
Get full text
Get full text
Article -
20
Signal detection algorithm for cognitive radio using singular value decomposition
Published 2011“…This paper highlights an algorithm for detecting the presence of wireless signal using the Singular Value Decomposition (SVD) technique.We simulated the algorithm to detect common digital signals in wireless communication to test the performance of the signal detector.The SVD-based signal detector was found to be more efficient in detecting a signal without knowing the properties of the transmitted signal.The performance of the algorithm is better compared to the favorable energy detection.The algorithm is suitable for blind spectrum sensing where the properties of the signal to be detected are unknown.This is also the advantage of the algorithm since any signal would interfere and subsequently affect the quality of service (QoS) of the IEEE 802.22 connection.Furthermore, the algorithm performed better in the low signalto-noise ratio (SNR) environment.…”
Get full text
Get full text
Get full text
Conference or Workshop Item
