Search Results - (( variable equation modified algorithm ) OR ( java application system algorithm ))
Search alternatives:
- variable equation »
- equation modified »
- java application »
- system algorithm »
-
1
-
2
Solving delay differential equations using modified 2-point block method
Published 2012“…The performance of a modified 2-point block method for solving delay differential equations (DDE) has been investigated. …”
Get full text
Get full text
Conference or Workshop Item -
3
-
4
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
5
-
6
A modified sine cosine algorithm for improving wind plant energy production
Published 2019“…This paper presents a Modified Sine Cosine Algorithm (M-SCA) to improve the controller parameter of an array of turbines such that the total energy production of wind plant is increased. …”
Get full text
Get full text
Get full text
Article -
7
-
8
Real-time algorithmic music composition application.
Published 2022“…In addition, the system also utilises JavaFx and jFugue for its graphical user interface and music programming respectively. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
9
Parameter extraction of single, double, and three diodes photovoltaic model based on guaranteed convergence arithmetic optimization algorithm and modified third order Newton Raphso...
Published 2022“…The proposed guaranteed convergence arithmetic optimization algorithm based on efficient modified third order Newton Raphson (GCAOAEmNR) method highlights important contributions to the literature in terms of methodology (explorer-exploiter phases) and objective function design. …”
Get full text
Get full text
Article -
10
Route Optimization System
Published 2005“…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
Get full text
Get full text
Final Year Project -
11
-
12
-
13
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
14
-
15
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…Java Media Framework library and the RTP protocol for audio transmission were used as development tools.The developed system designed in this thesis together with experimental results proved that the system could be implemented successfully. …”
Get full text
Get full text
Thesis -
16
Using adaptive safe experimentation dynamics algorithm for maximizing wind farm power
Published 2022“…This research presents a model-free strategy for increasing wind farm power generation based on the Adaptive Safe Experimentation Dynamics Algorithm (ASEDA). The ASEDA method is an improved version of the Safe Experimentation Dynamics (SED) algorithm that modifies the current tuning variable to respond to the changes in the objective function. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Variable Neighborhood Descent and Whale Optimization Algorithm for Examination Timetabling Problems at Universiti Malaysia Sarawak
Published 2025“…The original WOA is modified by replacing the equations designed for continuous problem domains with local search methods, enhancing its adaptability to discrete optimization problems. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
18
Using adaptive safe experimentation dynamics algorithm for maximizing wind farm power production
Published 2022“…This research presents a model-free strategy for increasing wind farm power generation based on the Adaptive Safe Experimentation Dynamics Algorithm (ASEDA). The ASEDA method is an improved version of the Safe Experimentation Dynamics (SED) algorithm that modifies the current tuning variable to respond to the changes in the objective function. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
20
Network game (Literati) / Chung Mei Kuen
Published 2003“…The possible applications of multimedia-networked system are endless, as the demand to support interactive communication among groups of users has increased significantly. …”
Get full text
Get full text
Thesis
