Search Results - (( variables reduction function algorithm ) OR ( java applications testing algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    An empirical study of density and distribution functions for ant swarm optimized rough reducts by Pratiwi, Lustiana, Choo, Yun Huoy, Draman @ Muda, Azah Kamilah

    Published 2011
    “…To describe relative probability of different random variables, Probability Density Function (PDF) and the Cumulative Density Function (CDF) are capable to specify its own characterization of Gaussian distributions. …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  3. 3

    A Comparative Performance Analysis of Gaussian Distribution Functions in Ant Swarm Optimized Rough Reducts by Pratiwi, Lustiana, Choo, Yun Huoy, Draman @ Muda, Azah Kamilah

    Published 2011
    “…Coexistence, cooperation, and individual contribution to food searching by a particle (ant) as a swarm (ant) survival behavior, depict the common characteristics of both algorithms. Solution vector of ACO is presented by implementing density and distribution function to search for a better solution and to specify a probability functions for every particle (ant). …”
    Get full text
    Get full text
    Article
  4. 4

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…Performance Testing is used to test the performance of algorithm implementations in applications. …”
    Get full text
    Get full text
    Journal
  5. 5

    A firefly algorithm based hybrid method for structural topology optimization by Gebremedhen, H.S., Woldemichael, D.E., Hashim, F.M.

    Published 2020
    “…The lower and upper limit of design variables (0 and 1) were used to find initial material distribution to initialize the firefly algorithm based section of the hybrid algorithm. …”
    Get full text
    Get full text
    Article
  6. 6

    Imposed weighting factor optimization method for torque ripple reduction of IM fed by indirect matrix converter with predictive control algorithm by Uddin, M., Mekhilef, Saad, Rivera, M., Rodriguez, J.

    Published 2015
    “…This paper proposes a weighting factor optimization method in predictive control algorithm for torque ripple reduction in an induction motor fed by an indirect matrix converter (IMC). …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Data-based PID control of flexible joint robot using adaptive safe experimentation dynamics algorithm by Mohd Ashraf, Ahmad, Haszuraidah, Ishak, Ahmad Nor Kasruddin, Nasir, Normaniha, Abd Ghani

    Published 2021
    “…This paper proposes the data-based PID controller of flexible joint robot based on adaptive safe experimentation dynamics (ASED) algorithm. The ASED algorithm is an enhanced version of SED algorithm where the updated tuning variable is modified to adapt to the change of the objective function. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  8. 8
  9. 9

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  10. 10

    Antidepressant Treatment Response Prediction With Early Assessment of Functional Near-Infrared Spectroscopy and Micro-RNA by Lee, Lok Hua, Ho, Cyrus Su Hui, Chan, Yee Ling, Tay, Gabrielle Wann Nii, Lu, Cheng-Kai, Tang, Tong Boon

    Published 2025
    “…To address this, the aim of the current study is to investigate MDD ATR at three response levels using fNIRS and micro-ribonucleic acids (miRNAs). Our proposed algorithm includes a custom inter-subject variability reduction based on the principal component analysis (PCA). …”
    Get full text
    Get full text
    Article
  11. 11

    Levy Flight Safe Experimentation Dynamics Algorithm for Data-Based PID Tuning of Flexible Joint Robot by Mohd Ashraf, Ahmad, Mohd Helmi, Suid, Muhammad Ikram, Mohd Rashid, Mohd Zaidi, Mohd Tumari, M. H., Sulaiman

    Published 2020
    “…This paper proposes the data-based PID controller of flexible joint robot based on Levy Flight Safe Experimentation Dynamics (LFSED) algorithm. The LFSED algorithm is an enhanced version of SED algorithm where the random perturbation of the updated tuning variable is based on Levy Flight function. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Classification System for Heart Disease Using Bayesian Classifier by Magendram, Anusha

    Published 2007
    “…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Integrated face detection approach for far image application by Salka, Tanko Daniel

    Published 2016
    “…The last stage of the algorithm is to apply the Euler method, in which its function is to search for the facial features. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15
  16. 16

    Cost reduction in bottom-up hierarchical-based VLSI floorplanning designs by Hoo, C.S., Kanesan, J., Ramiah, H.

    Published 2015
    “…Through mathematical derivation, the hard modules floorplanning area minimization cost function (two-dimensional) during culling stage is proven that a dimensional reduction can be carried out to be the difference-based cost function (one-dimensional) which simplifies the computation. …”
    Get full text
    Get full text
    Article
  17. 17

    Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli by Zulkifli, Nur Rasyiqah

    Published 2019
    “…The programming language that is used to write the program is Java Language that will run on android phones. As the result, this project was tested on the functionality of the mobile messaging application. …”
    Get full text
    Get full text
    Student Project
  18. 18
  19. 19
  20. 20