Search Results - (( using function ((method algorithm) OR (mead algorithm)) ) OR ( java applications _ algorithm ))
Search alternatives:
- java applications »
- method algorithm »
- using function »
- mead algorithm »
-
1
Bees algorithm enhanced with Nelder and Mead method for numerical function optimisation
Published 2019“…In order to enhance its accuracy and convergence rate, it is proposed to employ the Nelder and Mead (NM) method to implement the local search phase of the algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
2
A Novel Polytope Algorithm based on Nelder-mead method for localization in wireless sensor network
Published 2024“…Conclusion: The proposed algorithm that utilized NMM is more functional to enhance the precision of localization because of particular characteristics that are the flexible implementation of NMM and the free cost of using the RSSI technique.…”
Get full text
Get full text
Get full text
Get full text
Article -
3
-
4
Optimized PID controller of DC-DC buck converter based on archimedes optimization algorithm
Published 2023“…The proposed PID controller, optimized using AOA, is contrasted with PID controllers tuned via alternative algorithms including the hybrid Nelder-Mead method (AEONM), artificial ecosystem-based optimization (AEO), differential evolution (DE), and particle swarm optimizer (PSO). …”
Get full text
Get full text
Get full text
Article -
5
Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli
Published 2019“…The only way to read the messages is to know the method and the algorithm used in this project, which only the sender and the receiver will have the special key. …”
Get full text
Get full text
Student Project -
6
Modelling transmission dynamics of Covid-19 during pre-vaccination period in Malaysia: a GUI-based seird predictive model using Streamlit
Published 2024“…The mathematical model is solved using the Scipy odeint function, which uses the Livermore Solver for Ordinary Differential Equations with an Automatic method switching (LSODA) algorithm. …”
Get full text
Get full text
Get full text
Article -
7
Modelling transmission dynamics of covid-19 during Pre-vaccination period in Malaysia: a predictive guiseird model using streamlit
Published 2023“…The mathematical model is solved using Scipy odeint function, which uses Livermore Solver for Ordinary Differential Equations with an Automatic method switching (LSODA) algorithm. …”
Get full text
Get full text
Proceeding Paper -
8
Modelling transmission dynamics of Covid-19 during pre-vaccination period in Malaysia : a gui-based seird predictive model using streamlit
Published 2024“…The mathematical model is solved using the Scipy odeint function, which uses the Livermore Solver for Ordinary Differential Equations with an Automatic method switching (LSODA) algorithm. …”
Get full text
Get full text
Get full text
Article -
9
Simulation of COVID-19 outbreaks via graphical user interface (GUI)
Published 2021“…An improved SIRD model was solved via the 4th order Runge-Kutta (RK4) method and 14 unknown parameters were estimated by using Nelder- Mead algorithm and pattern-search technique. …”
Get full text
Get full text
Get full text
Article -
10
Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
Published 2009“…The strength of the information hiding science is due to the non-existence of standard algorithms to be used in hiding secret messages. Also there is randomness in hiding methods such as combining several media (covers) with different methods to pass a secret message. …”
Get full text
Get full text
Get full text
Article -
11
Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee
Published 2012“…This research was undertaken to develop methods to mitigate shoulder-surfing attack. Two falsifying authentication methods using: (i) penup event and neighbouring connectivity manipulation; and (ii) partial password selection and metaheuristic randomisation algorithm methods, were proposed. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
12
Mathematical model for predicting the performance of photovoltaic system with delayed solar irradiance
Published 2023“…The numerical solution is obtained by adopting the Runge Kutta method coupled with a parameter fitting technique, the Nelder Mead algorithm, which is implemented by using MATLAB software. …”
Get full text
Get full text
Thesis -
13
Mathematical model for predicting the performance of photovoltaic system with delayed solar irradiance
Published 2024“…The numerical solution is obtained by adopting the 4th-order Runge Kutta method coupled with a parameter fitting technique, the Nelder Mead algorithm, which is implemented by using MATLAB software. …”
Get full text
Get full text
Get full text
Article -
14
Network monopoly / Tan Kean Yeap
Published 2002“…The main aspect of this thesis is to produce a network monopoly system, which process multiple game sessions concurrently, enabling users to play the graphical game with people within the network. The algorithm design and implementation method mustnot only be workable, but also highly efficient in terms of execution speed and respond time. …”
Get full text
Get full text
Thesis -
15
Smart student timetable planner
Published 2025“…The system is implemented using Node.js with Express for server-side development, HTML, CSS, and JavaScript for the frontend, and Socket.IO for real-time collaboration. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
16
Tacit knowledge for business intelligence framework using cognitive-based approach
Published 2022“…The framework was tested on 23 librarians from several university libraries in West Java and Yogyakarta, Indonesia. The algorithm starts with a content targeted interview to identify the list of problems faced by librarians. …”
Get full text
Get full text
Thesis -
17
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
18
-
19
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
20
