Search Results - (( variable virtualization design algorithm ) OR ( java application matching algorithm ))
Search alternatives:
- application matching »
- design algorithm »
- java application »
- variable »
- virtualization »
-
1
-
2
Design optimization of valve timing at various engine speeds using Multi-Objective Genetic Algorithm (MOGA)
Published 2008“…In preprocessing of optimization, modeFrontier Response Surface Method (RSM) is able to model the behavior of engine performances corresponding to the change of design variables.…”
Get full text
Get full text
Proceeding Paper -
3
-
4
Performance of Glycemic Control Protocol and Virtual Trial
Published 2017“…This paper presents the evaluation of glycemic control protocol adapted in the ICU of Tengku Ampuan Afzan Hospital. Virtual trials method is used to simulate the controller algorithm on a virtual patient with feed variation factor. …”
Get full text
Get full text
Get full text
Article -
5
Performance of glycemic control protocol and virtual trial
Published 2017“…This paper presents the evaluation of glycemic control protocol adapted in the ICU of Tengku Ampuan Afzan Hospital. Virtual trials method is used to simulate the controller algorithm on a virtual patient with feed variation factor. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
6
Performance of glycemic control protocol and virtual trial
Published 2023“…This paper presents the evaluation of glycemic control protocol adapted in the ICU of Tengku Ampuan Afzan Hospital. Virtual trials method is used to simulate the controller algorithm on a virtual patient with feed variation factor. …”
Article -
7
-
8
"Application of Neural Network in developing Virtual Analyzer of Reformate Research Octane Number"
Published 2005“…Statistical analysis was also conducted to verify if the key variables tor estimating the Research Octane Number are suitable for network training. …”
Get full text
Get full text
Final Year Project -
9
Message based random variable length key encryption algorithm.
Published 2009Get full text
Get full text
Article -
10
Securing cloud data system (SCDS) for key exposure using AES algorithm
Published 2021“…The AES algorithm has its own structure to encrypt and decrypt sensitive data that make the attackers difficult to get the real data when encrypting by AES algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
Modeling of cupping suction system based on system identification method
Published 2022“…For instance, the input of hairy surface was virtually identical to the actual output at 90.75 %. …”
Get full text
Get full text
Undergraduates Project Papers -
12
Green building valuation based on machine learning algorithms / Thuraiya Mohd ... [et al.]
Published 2021Get full text
Get full text
Conference or Workshop Item -
13
Development of capability-based virtual cellular manufacturing systems in dual-resource constrained settings over semi-distributed layouts
Published 2012“…Virtual Cellular Manufacturing Systems (VCMSs) as a highly flexible manufacturing concept have been designed to improve the performance of classical Cellular Manufacturing Systems (CMSs) and job shop manufacturing environments by creating virtual grouping resources. …”
Get full text
Get full text
Thesis -
14
-
15
An Agent-Based System with Personalization and Intelligent Assistance Services for Facilitating Knowledge Sharing
Published 2006“…The main algorithms used are profile determination and user similarity. …”
Get full text
Get full text
Thesis -
16
Influence of object location in cone beam computed tomography (NewTom 5G and 3D Accuitomo 170) on gray value measurements at an implant site
Published 2014“…The inserted virtual implant was transformed on the same region on each CBCT scan by a three-dimensional registration algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article
