Search Results - (( (variable OR variables) realization based algorithm ) OR ( java application system algorithm ))

Refine Results
  1. 1

    Study of nature inspired computing (NIC) technique for optimal reactive power dispatch problems by Sulaiman, Mohd Herwan

    Published 2017
    “…ORPD problem is a nonlinear optimization problem that involving both equality constraints and inequality constraints. The proposed algorithms are tested on five different case studies which are IEEE 30-bus system with 13 control variables, IEEE 30-bus system with 19 control variables, IEEE 30-bus system with 25 control variables, IEEE 57-bus system with 25 control variables and IEEE 118-bus system with 77 control variables. …”
    Get full text
    Get full text
    Research Report
  2. 2

    Simple realization of 5-Segment discontinuous SVPWM based on FPGA by Sutikno, Tole, Jidin, Auzani, Basar, Mohd Farriz

    Published 2010
    “…The Space Vector Pulse Width Modulation (SVPWM) is possibly the best among all the PWM techniques for variable frequency drive applications. Unfortunately, the modulation algorithm is mainly implemented with software based on microcontroller or digital signal processors (DSP). …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8

    Vector Evaluated Gravitational Search Algorithm (VEGSA) for multi-objective optimization problems by Zuwairie, Ibrahim, Badaruddin, Muhammad, Kamarul Hawari, Ghazali, Lim, Kian Sheng, Sophan Wahyudi, Nawawi, Zulkifli, Md. Yusof

    Published 2012
    “…This paper presents a novel algorithm, which is based on Gravitational Search Algorithm (GSA), for multiobjective optimization problems. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Sleep as a predictor of depression level using Naïve Bayes / Nur Syakinah Md Roduan by Md Roduan, Nur Syakinah

    Published 2017
    “…Future work on this subject should improve the findings by modifying the variables used and/or by using other methods in term of data collection or the algorithm itself.…”
    Get full text
    Get full text
    Thesis
  10. 10

    Real-time algorithmic music composition application. by Yap, Alisa Yi Hui

    Published 2022
    “…In addition, the system also utilises JavaFx and jFugue for its graphical user interface and music programming respectively. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  11. 11

    Antidepressant Treatment Response Prediction With Early Assessment of Functional Near-Infrared Spectroscopy and Micro-RNA by Lee, Lok Hua, Ho, Cyrus Su Hui, Chan, Yee Ling, Tay, Gabrielle Wann Nii, Lu, Cheng-Kai, Tang, Tong Boon

    Published 2025
    “…To address this, the aim of the current study is to investigate MDD ATR at three response levels using fNIRS and micro-ribonucleic acids (miRNAs). Our proposed algorithm includes a custom inter-subject variability reduction based on the principal component analysis (PCA). …”
    Get full text
    Get full text
    Article
  12. 12

    Global Particle Swarm Optimization for High Dimension Numerical Functions Analysis by Jamian, J.J., Abdullah, M.N., Mokhlis, Hazlie, Mustafa, M.W., Bakar, Ab Halim Abu

    Published 2014
    “…The performance of this algorithm is measured based on the solutions’ quality, convergence characteristics, and their robustness after 50 trials. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Route Optimization System by Zulkifli, Abdul Hayy

    Published 2005
    “…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
    Get full text
    Get full text
    Final Year Project
  14. 14
  15. 15
  16. 16
  17. 17

    Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework by Asaad Aref, Ibrahim

    Published 2004
    “…Java Media Framework library and the RTP protocol for audio transmission were used as development tools.The developed system designed in this thesis together with experimental results proved that the system could be implemented successfully. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Decision tree as knowledge management tool in image classification by Kusrini, , Harjoko, Agus

    Published 2008
    “…Expert System has been grown so fast as a science that study how to make computer capable of solving problems that typically can only be solved by expert.It has been realized that the biggest challenge of developing expert system is the process include expert’s knowledge into the system.This research tries to model expert’s knowledge management using case based reasoning method.The knowledge itself is not inputted directly by the expert, but rather the system will learn the knowledge from what the expert did to the previous cases.This research takes image classification as the problem to be solved.As the knowledge development technique, we build decision tree by using C4.5 algorithm.Variables used for building the decision tree are the image visual features.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Towards Enhancing the Performance of Grid-Tied VSWT via Adopting Sine Cosine Algorithm-Based Optimal Control Scheme by Shutari, H., Saad, N., Nor, N.B.M., Tajuddin, M.F.N., Alqushaibi, A., Magzoub, M.A.

    Published 2021
    “…This paper is aimed at introducing a novel application of the sine cosine algorithm (SCA) which attempts to find the optimal gains of proportional-integral (PI) controllers used to control the power electronic converters (PEC) equipped with the variable speed wind turbine (VSWT) such that a maximum power extraction and performance enhancement can be realized. …”
    Get full text
    Get full text
    Article
  20. 20

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item