Search Results - (( variable learning real algorithm ) OR ( java application design algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  2. 2
  3. 3

    Ensemble Dual Recursive Learning Algorithms for Identifying Custom Tanks Flow with Leakage by Akib, Afifi, Saad , Nordin, Asirvadam , Vijanth Sagayan

    Published 2010
    “…The objective of this paper is to introduce a combination of advantages of different algorithm scheme into one learning algorithm. For this purpose, three models is developed, first using recursive least square algorithm (RLS), second using recursive instrument variable (RIV) algorithm and lastly using combination of this two algorithms. …”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Ensemble dual recursive learning algorithms for identifying flow with leakage by Akib, Afifi, Saad , Nordin, Asirvadam , Vijanth Sagayan

    Published 2010
    “…The objective of this paper is to introduce a combination of advantages of different algorithm scheme into one learning algorithm. For this purpose, three models is developed, first using recursive least square algorithm (RLS), second using recursive instrument variable (RIV) algorithm and lastly using combination of this two algorithm. …”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Multi-stage thermal-economical optimization of compact heat exchangers: A new evolutionary-based design approach for real-world problems by Yousefi, M., Darus, A.N., Yousefi, M., Hooshyar, D.

    Published 2015
    “…In this paper, a new design strategy is presented where variable operating conditions, which better represent real-world problems, are considered. …”
    Get full text
    Get full text
    Article
  6. 6
  7. 7

    Enhancing wind power forecasting accuracy with hybrid deep learning and teaching-learning-based optimization by Mohd Herwan, Sulaiman, Zuriani, Mustaffa

    Published 2024
    “…Using a real dataset spanning diverse weather conditions and turbine specifications collected between January 2018 and March 2020, the study employs 18 features as inputs, including Ambient Temperature, Wind Direction, and Wind Speed, with real power output in kW as the target variable. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    A decomposed streamflow non-gradientbased artificial intelligence forecasting algorithm with factoring in aleatoric and epistemic variables / Wei Yaxing by Wei , Yaxing

    Published 2024
    “…The firefly algorithm remains a feasible alternative for shallow architectural network models, while metaheuristic algorithms such as the Particle swarm algorithm and Bat algorithm are better options for deeper architectural network models. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework by Asaad Aref, Ibrahim

    Published 2004
    “…Java Media Framework library and the RTP protocol for audio transmission were used as development tools.The developed system designed in this thesis together with experimental results proved that the system could be implemented successfully. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12
  13. 13

    Green building valuation based on machine learning algorithms / Thuraiya Mohd ... [et al.] by Mohd, Thuraiya, Jamil, Syafiqah, Masrom, Suraya, Ab Rahim, Norbaya

    Published 2021
    “…This experiment used five common machine learning algorithms namely 1) Linear Regressor, 2) Decision Tree Regressor, 3) Random Forest Regressor, 4) Ridge Regressor and 5) Lasso Regressor tested on a real estate data-set of covering Kuala Lumpur District, Malaysia. 3 set of experiments was conducted based on the different feature selections and purposes The results show that the implementation of 16 variables based on Experiment 2 has given a promising effect on the model compare the other experiment, and the Random Forest Regressor by using the Split approach for training and validating data-set outperformed other algorithms compared to Cross-Validation approach. …”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14
  15. 15

    A deep learning approach for facial detection in targeted billboard advertising / Lau Sian En by Lau , Sian En

    Published 2025
    “…This system utilises sophisticated deep learning algorithm using Convolutional Neural Network (CNN) to identify and examine human faces, enabling advertisers to customise their content according to demographic variables including age and gender. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17
  18. 18

    Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things by Hadi, Ahmed Adnan

    Published 2022
    “…Here, the memory consumption can be reduced by enabling a feature selection algorithm that excludes nonrelevant features and preserves the relevant ones. the algorithm is developed based on the variable length of the PSO. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Network game (Literati) / Chung Mei Kuen by Chung, Mei Kuen

    Published 2003
    “…The main aspect of this thesis is to produce a networked gaming system, which process players. requested to play the game and enabling users to play the graphical game with people through the network. The algorithm design and implementation method must not only be workable, but also highly efficient in terms of execution speed and response time. …”
    Get full text
    Get full text
    Thesis
  20. 20

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…The application is designed to satisfy the user friendly interfaces and intent to be used by the end user without having the advanced knowledge in mobile security. …”
    Get full text
    Get full text
    Conference or Workshop Item