Search Results - (( java application during algorithm ) OR ( parameter interaction modified algorithm ))
Search alternatives:
- parameter interaction »
- interaction modified »
- application during »
- java application »
- during algorithm »
-
1
A Modified ACO-based Search Algorithm for Detecting Protein Functional Module From Protein Interaction Network
Published 2015“…Some shortcomings were identified and addressed by proposing a Modified Ant Colony Optimization Algorithm (ACO-PFMDM), which introduces two new scheme for controlling the two main parameters of ACO to solve PFMDP. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
2
Modeling the properties of terminal blend crumb rubber modified bitumen with crosslinking additives
Published 2025Subjects:Article -
3
A Hybrid ACO-Graph Entropy for Functional Modules Detection From Protein-Protein Interaction Network
Published 2018“…Some shortcomings were identified and addressed by proposing a Modified Ant Colony Optimization Algorithm (ACO-PFMDM), which introduces two new scheme for controlling the two main parameters of ACO to solve PFMDP. …”
Get full text
Get full text
Get full text
Article -
4
Application of conjugate gradient approach for nonlinear optimal control problem with model-reality differences
Published 2018“…In doing so, an expanded optimal control problem is introduced such that system optimization and parameter estimation are mutually interactive. Accordingly, the optimality conditions are derived after the Hamiltonian function is defined. …”
Get full text
Get full text
Get full text
Article -
5
Application of conjugate gradient approach for nonlinear optimal control problem with model-reality difference
Published 2018“…In doing so, an expanded optimal control problem is introduced such that system optimization and parameter estimation are mutually interactive. Accordingly, the optimality conditions are derived after the Hamiltonian function is defined. …”
Get full text
Get full text
Get full text
Article -
6
MULTIVARIABLE CLOSED-LOOP SYSTEM IDENTIFICATION USING ITERATIVE LEAKY LEAST MEAN SQUARES METHOD
Published 2017“…In this research. novel algorithms have been developed to: (I) isolate the less interacting channe Is using a modified partial correlation algorithm. (2) achieve unbiased and consistent parameter estimates using an iterative LLMS algorithm and (3) develop parsimonious models for closed-loop MIMO systems. …”
Get full text
Get full text
Thesis -
7
-
8
Simultaneous computation of model order and parameter estimation for ARX model based on single swarm and multi swarm simulated Kalman filter
Published 2017“…Simultaneous Model Order and Parameter Estimation (SMOPE) and Simultaneous Model Order and Parameter Estimation based on Multi Swarm (SMOPE-MS) are two techniques of implementing meta-heuristic algorithm to iteratively establish an optimal model order and parameters simultaneously for an unknown system. …”
Get full text
Get full text
Get full text
Article -
9
Modified least trimmed squares method for face recognition / Nur Azimah Abdul Rahim
Published 2018“…The genetic algorithm configuration for n (number of observations) and p (parameter) was changed to assess the performance of modified method. …”
Get full text
Get full text
Thesis -
10
SUDOKU HELPER
Published 2015“…In this paper research, author presents an algorithm to provide a tutorial for any Sudoku player who got stuck during the solving process. …”
Get full text
Get full text
Final Year Project -
11
Optimization of chemotherapy using metaheuristic optimization algorithms / Prakas Gopal Samy
Published 2024“…The HM emerges as a dominant strategy, driven by the Multi-Objective Differential Evolution (MODE) algorithm under literature-based control parameter settings for the mathematical model. …”
Get full text
Get full text
Get full text
Thesis -
12
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
13
Improved model for blood glucose control using Multi-Parametric Model Predictive Control (MP-MPC) / Nur Farhana Mohd Yusof
Published 2019“…As a result, we managed to have a good correlation on interactions between the parameters in glucose-insulin intervention. …”
Get full text
Get full text
Thesis -
14
A comprehensive analysis of surface electromyography for control of lower limb exoskeleton
Published 2016“…Unlike other control methods applied to industrial robotic systems in the sense of giving specific trajectory to be tracked, ERD physically interacts alongside with the user. To attain high cognitive interaction and safe human-machine system, there is a need to detect the user‘s movement intention. …”
Get full text
Get full text
Thesis -
15
A centralised multi-objective model predictive control for biventricular assist devices / Vivian Koh Ci Ai
Published 2020“…Therefore, the second objective was to modify a conventional centralised MPC algorithm to cater for the state and time-varying factors of the CVS-BiVAD system. …”
Get full text
Get full text
Get full text
Thesis -
16
Comparison of quadratic Trigonometric B-Spline and Cubic B-Spline in designing objects / Ainna Solihah Awaluddin
Published 2024“…By designing curves of an object using Wolfram Mathematica, the study integrates an interactive application for both methods to demonstrates the curve behaviour by modifying the shape parameters and control points of the objects. …”
Get full text
Get full text
Thesis -
17
-
18
-
19
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
20
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
Published 2015“…This research work was limited to Java based web applications. In future research, the method can be extended to include other programming languages as well as other similar web application security vulnerabilities.…”
Get full text
Get full text
Thesis
