Search Results - (( java application using algorithm ) OR ( model evaluation step algorithm ))
Search alternatives:
- java application »
- model evaluation »
- using algorithm »
- evaluation step »
- step algorithm »
-
1
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…The development of the simulation model consists of seven steps. The steps are problem definition, construct the simulation model, test and validate the model, design the simulation experiments, conduct the simulation experiments, evaluate the result and implement the result. …”
Get full text
Get full text
Get full text
Thesis -
2
Algorithmic approaches in model selection of the air passengers flows data
Published 2015“…Algorithm is an important element in any problem solving situation.In statistical modelling strategy, the algorithm provides a step by step process in model building, model testing, choosing the ‘best’ model and even forecasting using the chosen model.Tacit knowledge has contributed to the existence of a huge variability in manual modelling process especially between expert and non-expert modellers.Many algorithms (automated model selection) have been developed to bridge the gap either through single or multiple equation modelling.This study aims to evaluate the forecasting performances of several selected algorithms on air passengers flow data based on Root Mean Square Error (RMSE) and Geometric Root Mean Square Error (GRMSE).The findings show that multiple models selection performed well in one and two step-ahead forecast but was outperformed by single model in three step-ahead forecasts.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Multistep forecasting for highly volatile data using new algorithm of Box-Jenkins and GARCH
Published 2018“…The algorithm adds the value of BJ-G model since it allows the model to explain more about the characteristics of the volatile series up to n-step ahead forecast.…”
Get full text
Get full text
Conference or Workshop Item -
4
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
5
-
6
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
7
Novel Adaptive Bacterial Foraging Algorithms for Global Optimisation with Application to Modelling of a TRS
Published 2015“…The constant step size in the original bacterial foraging algorithm causes oscillation in the convergence graph where bacteria are not able to reach the optimum location with large step size, hence reducing the accuracy of the final solution. …”
Get full text
Get full text
Article -
8
Iterative And Single-Step Solutions Of Two Dimensional Time-Domain Inverse Scattering Problem Featuring Ultra Wide Band Sensors
Published 2010“…First, the algorithms‘ performances were evaluated using numerical simulation employing two different scanning geometries: limited and full view scanning geometries, where the applicability of these algorithms was accessed by comparing the reconstructed images with actual model. …”
Get full text
Get full text
Thesis -
9
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
11
Numerical analysis
Published 2008“…Many of these applications yield mathematical models which involve numerical approximations or evaluations to give a complete answer. …”
Get full text
Get full text
Get full text
Article -
12
Enhanced Community Detection Based On Cross Time For Higher Visibility In Supply Chain: A Six-Steps Model Framework
Published 2019“…This paper proposed six steps model framework that aim: (1) To construct the nodes and vertices for temporal graph representing the relationship in supply chain network; (2) To propose an enhanced temporal community detection algorithm in graph analytics based on Cross-time approach and (3) To evaluate the enhanced temporal community detection algorithm in graph analytics for representing relationship in supply chain network based on external and internal quality analysis. …”
Get full text
Get full text
Get full text
Article -
13
Variable order step size method for solving orbital problems with periodic solutions
Published 2024journal::journal article -
14
Development of hybrid artificial intelligent based handover decision algorithm
Published 2017“…The performance of the newly developed k � step ahead ANN based RSS prediction algorithm was evaluated using simulated and real data acquired from available mobile communication networks. …”
Get full text
Get full text
Get full text
Get full text
Article -
15
A coalition model for efficient indexing in wireless sensor network with random mobility / Hazem Jihad Ali Badarneh
Published 2021“…The proposed model consists of Dynamic-Coalition framework, Static-Coalition algorithm, and Coalition-Based Index-Tree framework. …”
Get full text
Get full text
Get full text
Thesis -
16
-
17
Two steps hybrid calibration algorithm of support vector regression and K-nearest neighbors
Published 2020“…This paper presents a new hybrid calibration model that is based on two steps K nearest neighbor interpolation and support vector regression. …”
Get full text
Get full text
Article -
18
Real-time algorithmic music composition application.
Published 2022“…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
19
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
Get full text
Get full text
Conference or Workshop Item -
20
Evaluation of different control policies of semi-active MR fluid damper of a quarter-car model
Published 2012“…The performances of these models are evaluated to select a best model. The quarter-car model is executed using step input with two most common and effective control algorithm in vehicle suspension control which are linear quadratic regulator control, and Proportional Integral Derivative control algorithm. …”
Get full text
Get full text
Get full text
Article
