Search Results - (( based constructive method algorithm ) OR ( using simulation a algorithm ))
Search alternatives:
- based constructive »
- method algorithm »
- simulation a »
- a algorithm »
-
1
A generalized laser simulator algorithm for optimal path planning in constraints environment
Published 2022“…A statistical test was used to demonstrate the efficiency of the proposed algorithm over the compared methods. …”
Get full text
Thesis -
2
Design and analysis of DNA fragment assembly's converter and checker modules using De Bruijin Graph / Mohd Shafiq Mohd Helmi
Published 2012“…The algorithm used to construct the module is Bruijn Graph. …”
Get full text
Get full text
Thesis -
3
Design and analysis of DNA fragment assembly's converter and checker modules using De Bruijin Graph : article / Mohd Shafiq Mohd Helmi
Published 2012“…The algorithm used to construct the module is Bruijn Graph. …”
Get full text
Get full text
Article -
4
Sine-cosine optimization-based bijective substitution-boxes construction using enhanced dynamics of chaotic map
Published 2018“…This paper proposes a novel method of constructing strong substitution-boxes (S-boxes) of order n (4 ≤ n ≤ 8) based on a recent optimization algorithm known as sine-cosine algorithm (SCA). …”
Get full text
Get full text
Get full text
Article -
5
Mitigation of harmonic current for balanced three-phase power system based on Extended Fryze Adaptive notch filter
Published 2023“…The algorithm's effectiveness in operation for the Shunt APF is validated through simulation using MATLAB/Simulink and experiment work by integrating the algorithm with DSPACE RS1104. …”
Get full text
Get full text
Get full text
Article -
6
Resource scheduling algorithm with load balancing for cloud service provisioning
Published 2019“…The method constructs a Fuzzy-based Multidimensional Resource Scheduling model to obtain resource scheduling efficiency in cloud infrastructure. …”
Get full text
Get full text
Article -
7
Dual search maximum power point algorithm based on mathematical analysis under partially-shaded conditions
Published 2016“…Moreover, it is very important that the algorithms should be general and not so complicated which could be implemented for all systems.Therefore, this research presents design and development of a novel method, which is called dual search maximum power point (DSMPP) algorithm, for tracking the GMPP under PSCs. …”
Get full text
Get full text
Thesis -
8
Confidence intervals (CI) for concentration parameter in von Mises distribution and analysis of missing values for circular data / Siti Fatimah binti Hassan
Published 2015“…By ignoring the existence of missing values, leads to the biasness and lack of efficiency of a statistics. In this study, three imputation methods are considered namely expectation-maximization (EM) algorithm and data augmentation (DA) algorithm. …”
Get full text
Get full text
Thesis -
9
Graph coloring program of exam scheduling modeling based on bitwise coloring algorithm using python
Published 2022“…Bitwise operations make this algorithm run very fast. The algorithm constructed by the researcher is a modification of Komosko, etc.’s algorithm in 2015 and it is the key result of this research. …”
Get full text
Get full text
Get full text
Article -
10
Fast and optimal tuning of fractional order PID controller for AVR system based on memorizable-smoothed functional algorithm
Published 2022“…Therefore, this study proposes a modified smoothed function algorithm (MSFA) based method to tune the FOPID controller of AVR system since it requires fewer number of function evaluation per iteration. …”
Get full text
Get full text
Get full text
Article -
11
Enhanced Intelligent Water Drops Algorithm for University Examination Timetabling Problems
Published 2024“…The IWD is a recent metaheuristic population-based algorithm belonging to the swarm intelligent category which simulates the dynamic of the river systems. …”
thesis::doctoral thesis -
12
Simulation-Based Power Estimation for High Throughput SHA-256 Design on Unfolding Transformation
Published 2022“…The purpose of this project is to reduce dynamic thermal power dissipation of SHA-256 unfolding transformation. State encoding is a method used in reducing power design strategies that have been proposed to lower the dynamic power dissipation of the algorithm. …”
Get full text
Get full text
Get full text
Proceeding -
13
Accuracy assessment of Digital Terrain Model (DTM) Constructed Cloth Simulation Filter (CSF) and Multi Curvature Classification (MCC) algorithm on UAV LiDAR dataset / Mohamad Khair...
Published 2023“…Two algorithms, the Cloth Simulation Filter (CSF) in CloudCompare and the Multiscale Curvature Classification (MCC) in Global Mapper, were tested for this purpose. …”
Get full text
Get full text
Student Project -
14
A Distributed Topology Control Method for Improving Energy Efficiency of Wireless Sensor Networks
Published 2012“…By using the TPSI algorithm, our method can build the virtual backbone in a fully distributed manner using localized information. …”
Get full text
Get full text
Conference or Workshop Item -
15
Optimization of Digital Electronic Circuit Structure Design Using Genetic Algorithm
Published 2008“…ODCSD is a digital circuit structure design simulation program. …”
Get full text
Get full text
Thesis -
16
-
17
-
18
Parametric system identification and active vibration control of vibrational structures using genetic algorithm
Published 2007“…In order to construct the model, several sets of vibration data were obtained from the simulation of the flexible plate structures based on finite difference method. …”
Get full text
Get full text
Thesis -
19
Development Of Construction Noise Prediction Method Using Deep Learning Model
Published 2021“…A simple prediction chart method was developed on top of a stochastic algorithm called Monte Carlo simulation by complying with the standard BS 5228 for the noise prediction in the environmental impact assessment during the planning stage of a construction project. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
20
The Implementation of Securing Plaintext File Using Cryptography Method in Web Based Environment
Published 2004“…The methodology and testing procedure which are used during this evaluation is based on a simulation model. …”
Get full text
Get full text
Get full text
Thesis
