Search Results - (( developing critical points algorithm ) OR ( java implication based algorithm ))

Refine Results
  1. 1

    An Algorithmic Approach for Stability of an Autonomous System by Cik Soh, Shaharuddin

    Published 2002
    “…Search for critical point is conducted. L2. Eigenvalues of the linear system are computed. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Chebyshev approximation of discrete polynomials and splines by Che Seman, Fauziahanim

    Published 2004
    “…A total of five algorithms based on the Lagrange polynomials and cubic splines have been developed in this work to identify the extreme points. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Chebyshev approximation of discrete polynomials and splines by Che Seman, Fauziahanim

    Published 2004
    “…A total of five algorithms based on the Lagrange polynomials and cubic splines have been developed in this work to identify the extreme points. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Exponential Parameterized Cubic B-Spline Curves And Surfaces by Ammad, Muhammad

    Published 2020
    “…The proposed method is the extension in the B-spline interpolation technique of using arbitrary derivatives at end points. In developing B-spline curve interpolation method, an algorithm is presented for interpolating data points. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Dynamic Feedback Flow Control Algorithms for Unicast and Multicast Available Bit Rate Service in Asynchronous Transfer Mode Networks by Abdelrahman, Ali Mohamed

    Published 2000
    “…This thesis develops dynamic feedback flow control schemes in ATM networks, with primary focus on point-to-point (unicast) and point-tomUltipoint (multicast) ABR algorithms. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Continuation power flow for voltage stability assessment / Mohd Zamri Laton by Laton, Mohd Zamri

    Published 2006
    “…The continuation power flow program is developed using MATLAB programming language base on algorithm of continuation power flow (CPF) technique, which can compute efficiently the parameter at saddle node bifurcation point. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Development of a Robust Wireless Sensor Mesh and Multi-hop Network by Mohd Taib, Ahmad Muhaimin

    Published 2012
    “…This project is solely a research and development of routing algorithm for WSN by using an existing source and straight away finding its weak point in order to apply further improvisation. …”
    Get full text
    Get full text
    Final Year Project
  8. 8
  9. 9

    Priority hybrid and EEF uplink scheduling algorithm for IEEE 802.16E by Oad, Aneel

    Published 2013
    “…In this research the focus is on the WiMAX uplink traffic scheduling in the Point to Multipoint (PMP) mode. In this research, two algorithms tailored at enhancing the performance of hybrid algorithms in the WiMAX domains have been designed and developed. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Network Traffic Classification Analysis on Differentiated Services Code Point Using Deep Learning Models for Efficient Deep Packet Inspection by Ahmed Khan, Fazeel, Abubakar, Adamu

    Published 2024
    “…The data was gathered using real-time packet capturing tools which were then processed and moved with model development using different deep learning algorithms such as, LSTM, MLP, RNN and Autoencoders. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Load flow study comparison between Newton Raphson load flow method and fast decouple load flow method / Mohd Haizilan Alias by Alias, Mohd Haizilan

    Published 2007
    “…The conventional Newton's Method was found to be inadequate to obtain the maximum loading point (MLP) or critical point of the power system due to the Jacobian matrix singularity. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14
  15. 15

    Process Planning Optimization In Reconfigurable Manufacturing Systems by Musharavati, Farayi

    Published 2008
    “…The five (5) AADTs include; a variant of the simulated annealing algorithm that implements heuristic knowledge at critical decision points, two (2) cooperative search schemes based on a “loose hybridization” of the Boltzmann Machine algorithm with (i) simulated annealing, and (ii) genetic algorithm search techniques, and two (2) modified genetic algorithms. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Square groove detection based on forstner with canny edge operator using laser vision sensor by Mohammed Naji, Osamah Abdullah Ahmed

    Published 2023
    “…The objectives of 1his research are to develop a detection algorithm 1hat can extract 1he feature points of1he square-groove; and 1he second objective is to evaluate 1he detection algorithm and its ability to extract 1he image features of 1he square-groove in temis of 1he accuracy. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    A new 128-bit block cipher by Mohd Ali, Fakariah Hani

    Published 2009
    “…Every country has different requirements when requesting block cipher so there is no limit in developing them. According to the National IT Council (NlTC) report on "Securing Malaysia Sovereignty in the CyberWorld" provided by Ministry of Science, Technology and Innovation, Malaysia, they have outlined critical areas in which new and additional research and development is needed to increase the protection of the national information infrastructure. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Sales prediction for media platforms advertising expenditure using Linear Regression / Nur Athirah Abdurahman by Abdurahman, Nur Athirah

    Published 2023
    “…The algorithm calculates a linear equation that represents the best-fit line through the data points, enabling the prediction of future sales based on advertising investment.…”
    Get full text
    Get full text
    Thesis
  19. 19

    Revolutionizing Perimeter Intrusion Detection: A Machine Learning-Driven Approach with Curated Dataset Generation for Enhanced Security by Pitafi, S., Anwar, T., Dewa Made Widia, I., Yimwadsana, B.

    Published 2023
    “…After collecting the data from above mentioned sensors we applied machine learning algorithms DBSCAN to cluster the data points and K-NN classification to classify those clusters in one-dimensional data, but the results were not much satisfying. …”
    Get full text
    Get full text
    Article
  20. 20

    On the influence of inclined lightning channel on lightning induced voltage evaluation by Rameli, Norhidayu, Ab Kadir, Mohd Zainal Abidin, Izadi, Mahdi, Gomes, Chandima, Jasni, Jasronita

    Published 2012
    “…This induced voltage is expected to be increased when the inclined angle with respect to the observation point is decreased. Appropriate method of induced voltage algorithm with respect to the incline lightning channel will be developed and compared with other method. …”
    Get full text
    Get full text
    Conference or Workshop Item