Search Results - (( developing critical points algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- implication based »
- points algorithm »
- java implication »
-
1
An Algorithmic Approach for Stability of an Autonomous System
Published 2002“…Search for critical point is conducted. L2. Eigenvalues of the linear system are computed. …”
Get full text
Get full text
Thesis -
2
Chebyshev approximation of discrete polynomials and splines
Published 2004“…A total of five algorithms based on the Lagrange polynomials and cubic splines have been developed in this work to identify the extreme points. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
3
Chebyshev approximation of discrete polynomials and splines
Published 2004“…A total of five algorithms based on the Lagrange polynomials and cubic splines have been developed in this work to identify the extreme points. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
4
Exponential Parameterized Cubic B-Spline Curves And Surfaces
Published 2020“…The proposed method is the extension in the B-spline interpolation technique of using arbitrary derivatives at end points. In developing B-spline curve interpolation method, an algorithm is presented for interpolating data points. …”
Get full text
Get full text
Thesis -
5
Dynamic Feedback Flow Control Algorithms for Unicast and Multicast Available Bit Rate Service in Asynchronous Transfer Mode Networks
Published 2000“…This thesis develops dynamic feedback flow control schemes in ATM networks, with primary focus on point-to-point (unicast) and point-tomUltipoint (multicast) ABR algorithms. …”
Get full text
Get full text
Thesis -
6
Continuation power flow for voltage stability assessment / Mohd Zamri Laton
Published 2006“…The continuation power flow program is developed using MATLAB programming language base on algorithm of continuation power flow (CPF) technique, which can compute efficiently the parameter at saddle node bifurcation point. …”
Get full text
Get full text
Thesis -
7
Development of a Robust Wireless Sensor Mesh and Multi-hop Network
Published 2012“…This project is solely a research and development of routing algorithm for WSN by using an existing source and straight away finding its weak point in order to apply further improvisation. …”
Get full text
Get full text
Final Year Project -
8
-
9
Priority hybrid and EEF uplink scheduling algorithm for IEEE 802.16E
Published 2013“…In this research the focus is on the WiMAX uplink traffic scheduling in the Point to Multipoint (PMP) mode. In this research, two algorithms tailored at enhancing the performance of hybrid algorithms in the WiMAX domains have been designed and developed. …”
Get full text
Get full text
Thesis -
10
-
11
Network Traffic Classification Analysis on Differentiated Services Code Point Using Deep Learning Models for Efficient Deep Packet Inspection
Published 2024“…The data was gathered using real-time packet capturing tools which were then processed and moved with model development using different deep learning algorithms such as, LSTM, MLP, RNN and Autoencoders. …”
Get full text
Get full text
Get full text
Article -
12
Load flow study comparison between Newton Raphson load flow method and fast decouple load flow method / Mohd Haizilan Alias
Published 2007“…The conventional Newton's Method was found to be inadequate to obtain the maximum loading point (MLP) or critical point of the power system due to the Jacobian matrix singularity. …”
Get full text
Get full text
Thesis -
13
-
14
-
15
Process Planning Optimization In Reconfigurable Manufacturing Systems
Published 2008“…The five (5) AADTs include; a variant of the simulated annealing algorithm that implements heuristic knowledge at critical decision points, two (2) cooperative search schemes based on a “loose hybridization” of the Boltzmann Machine algorithm with (i) simulated annealing, and (ii) genetic algorithm search techniques, and two (2) modified genetic algorithms. …”
Get full text
Get full text
Thesis -
16
Square groove detection based on forstner with canny edge operator using laser vision sensor
Published 2023“…The objectives of 1his research are to develop a detection algorithm 1hat can extract 1he feature points of1he square-groove; and 1he second objective is to evaluate 1he detection algorithm and its ability to extract 1he image features of 1he square-groove in temis of 1he accuracy. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
17
A new 128-bit block cipher
Published 2009“…Every country has different requirements when requesting block cipher so there is no limit in developing them. According to the National IT Council (NlTC) report on "Securing Malaysia Sovereignty in the CyberWorld" provided by Ministry of Science, Technology and Innovation, Malaysia, they have outlined critical areas in which new and additional research and development is needed to increase the protection of the national information infrastructure. …”
Get full text
Get full text
Thesis -
18
Sales prediction for media platforms advertising expenditure using Linear Regression / Nur Athirah Abdurahman
Published 2023“…The algorithm calculates a linear equation that represents the best-fit line through the data points, enabling the prediction of future sales based on advertising investment.…”
Get full text
Get full text
Thesis -
19
Revolutionizing Perimeter Intrusion Detection: A Machine Learning-Driven Approach with Curated Dataset Generation for Enhanced Security
Published 2023“…After collecting the data from above mentioned sensors we applied machine learning algorithms DBSCAN to cluster the data points and K-NN classification to classify those clusters in one-dimensional data, but the results were not much satisfying. …”
Get full text
Get full text
Article -
20
On the influence of inclined lightning channel on lightning induced voltage evaluation
Published 2012“…This induced voltage is expected to be increased when the inclined angle with respect to the observation point is decreased. Appropriate method of induced voltage algorithm with respect to the incline lightning channel will be developed and compared with other method. …”
Get full text
Get full text
Conference or Workshop Item
