Search Results - (( developing existing connection algorithm ) OR ( java implication force algorithm ))
Search alternatives:
- connection algorithm »
- developing existing »
- implication force »
- java implication »
- force algorithm »
-
1
-
2
-
3
A novel peak load shaving algorithm for isolated microgrid using hybrid PV-BESS system
Published 2021“…It can also ensure an economic and environment friendly system where the existing algorithms are limited to serve these. The proposed algorithm can mitigate the available power issues for hybrid PV-BESS connected system and it can also minimize the operating cost by dispatching the generation units optimally. …”
Get full text
Get full text
Article -
4
An immune-genetic algorithm with tabu local search for network intrusion detection system / Hamizan Suhaimi
Published 2021“…The performance of the proposed method and other existing techniques (Genetic Algorithm, Artificial Immune System and Immune-Genetic Algorithm) were analysed to evaluate and determine its efficiency in terms of maximum intrusion detection rate and the highest true positive rate. …”
Get full text
Get full text
Thesis -
5
Secured Autonomous Agent-Based Intrusion Detection System (SAAIDS)
Published 2024thesis::master thesis -
6
Stereolithography 3D printing development of 3D printing machine controller using the predefined closest-distance volume interpolator system
Published 2019“…These line segments are mapped based on the projection device display resolution by the pixel-line mapping algorithm. Then, the pixelated line segments are connected to form single/multiple contour loops using contour loop algorithm. …”
Get full text
Get full text
Research Report -
7
Routing problem in rectangular mesh network using Dijkstra’s based Greedy method
Published 2018“…In this research, Dijkstra’s algorithm is used to establish the shortest connection for each net. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Routing problem in rectangular mesh network using shortest path based Greedy method
Published 2019“…In this research, Dijkstra's algorithm is used to establish the shortest connection for each net. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Quality of service management algorithms in WiMAX networks
Published 2015“…Substantial simulations have been extensively conducted to evaluate the performance of the proposed algorithms in comparison to the existing bandwidth and power management algorithms. …”
Get full text
Get full text
Thesis -
10
Improved ADALINE Harmonics Extraction Algorithm for Boosting Performance of Photovoltaic Shunt Active Power Filter under Dynamic Operations
Published 2016“…For evaluation and comparison purposes, both proposed and existing algorithms have been developed. The PV SAPF with both algorithms was simulated in MATLABSimulink respectively, with and without operation or connection of PV. …”
Get full text
Get full text
Article -
11
Routing problem in rectangular mesh network using shortest path based Greedy method
Published 2019“…In this research, Dijkstra's algorithm is used to establish the shortest connection for each net. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Quantum Processing Framework And Hybrid Algorithms For Routing Problems
Published 2010“…Next, the framework of QAPU was designed and developed. For this purpose, some gates and connections were projected in the framework which could be applied for future quantum algorithms. …”
Get full text
Get full text
Thesis -
13
Enhancement of bluetooth security authentication using hash-based message authentication code (HMAC) algorithm
Published 2014“…This proposed protocol uses Hash-based Message Authentication Code (HMAC) algorithm with Secure Hash Algorithm (SHA-256). The implementation of this proposal is based on the Arduino Integrated Development Environment (IDE) as software and a Bluetooth (BT) Shield connected to an Arduino Uno R3 boards as hardware. …”
Get full text
Get full text
Get full text
Proceeding Paper -
14
Development of automatic pest sampling and detection system for cash crops
Published 2019“…The process of insect detection and counting is starting with image acquisition, image preprocessing, and morphological operations. Connected components algorithm was implemented for insect detection and counting. …”
Get full text
Get full text
Thesis -
15
Improved ADALINE harmonics extraction algorithm for boosting performance of photovoltaic shunt active power filter under dynamic operations
Published 2016“…For evaluation and comparison purposes, both proposed and existing algorithms have been developed. The PV SAPF with both algorithms was simulated in MATLAB-Simulink respectively, with and without operation or connection of PV. …”
Get full text
Get full text
Get full text
Article -
16
Development of adaptive perturb and observe-fuzzy control maximum power point tracking for photovoltaic boost dc-dc converter
Published 2014“…It should improve MPPT performance especially with existing of noise. For evaluation and comparison analysis, conventional P&O and fuzzy logic control algorithms have been developed too. …”
Get full text
Get full text
Article -
17
Dynamic bandwidth allocation (DBA) for Fi-Wi realization using IN USRP
Published 2024text::Final Year Project -
18
Neighbour-based on-demand routing algorithms for mobile ad hoc networks
Published 2017“…Thus, there is a room for further enhancement to develop a routing algorithm as to mitigate the drawbacks with the NCPR. …”
Get full text
Get full text
Get full text
Thesis -
19
Density based subspace clustering: a case study on perception of the required skill
Published 2014“…This research aims to develop an improved model for subspace clustering based on density connection. …”
Get full text
Get full text
Thesis -
20
Density subspace clustering: a case study on perception of the required skill
Published 2014“…This research aims to develop an improved model for subspace clustering based on density connection. …”
Get full text
Get full text
Thesis
