Search Results - (( developing function using algorithm ) OR ( _ implementation during algorithm ))

Refine Results
  1. 1

    Implementation of a modified incremental conductance MPPT algorithm with direct control based on a fuzzy duty cycle change estimator using dSPACE by Radjai, T., Rahmani, L., Mekhilef, Saad, Gaubert, J.P.

    Published 2014
    “…Matlab/Simulink was used for the simulation studies. Additionally, the algorithms were digitally implemented on the dSPACE ACE1104 platform. …”
    Get full text
    Article
  2. 2

    Optimal overcurrent relay solutions for protection coordination using metaheuristics approaches with penalty function method by Noor Zaihah, Jamal, Mohd Herwan, Sulaiman, Abdul, Nasir, Jabbar, Waheb A.

    Published 2024
    “…The optimized value of the TMS and PS will be selected using the algorithms to ensure the minimize result of the objective function. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Design and development of sensor based traffic light system by Albagul, Abdulgani, Hrairi, Meftah, Wahyudi, Martono, Hidayathullah, M. F.

    Published 2006
    “…Hardware simulation tests were successfully performed on the algorithm implemented into a controller. The new timing scheme that was implemented promises an improvement in the current traffic light system and this system is feasible, affordable and ready to be implemented especially during peak hours. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Smart energy meter with adaptive communication data transfer algorithm for electrical energy monitoring by Ab Halim, Haizum Hanim

    Published 2021
    “…Smart metering program has gained importance and started to be implemented in most developed country including Malaysia. …”
    Get full text
    Get full text
    Thesis
  5. 5

    E-history Malaysian secondary school textbook using TF-IDF algorithm and text visualization / Nur Hafizah Mohd Ridzuan by Mohd Ridzuan, Nur Hafizah

    Published 2020
    “…The objective of the project is to design and develop an E-History Malaysian secondary school textbook system using Term Frequency-Inverse Document Frequency (TF-IDF) algorithm with text visualization and also to test the functionality and usability of the system through a web-based system. …”
    Get full text
    Get full text
    Thesis
  6. 6

    VISUALIZATION OF GENETIC ALGORITHM BASED ON 2-D GRAPH TO ACCELERATE THE SEARCHING WITH HUMAN INTERVENTIONS. by FAROOQ, HUMERA

    Published 2012
    “…A tool termed as VIGA-20 (Visualization of Genetic Algorithm using 2-0 Graph) is implemented to accomplish this goal. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Y-type Random 2-satisfiability In Discrete Hopfield Neural Network by Guo, Yueling

    Published 2024
    “…Additionally, the proposed Hybrid Differential Evolution Algorithm was implemented into the training phase to ensure that the cost function of the Discrete Hopfield Neural Network is minimized. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Hybrid of firefly algorithm and pattern search for solving optimization problems by Wahid, Fazli, Ghazali, Rozaida

    Published 2018
    “…The developed approach has been applied to various types of maximization and minimization functions and the performance has been compared with standard FA and genetic algorithm in terms of getting the most optimal values for the functions being considered. …”
    Get full text
    Get full text
    Article
  10. 10

    A new meta heuristic evolutionary programming (NMEP) in optimizing economic energy dispatch by Mohamad Ridzuan, Mohamad Radzi, Hassan, Elia Erwani, Abdullah, Abdul Rahim, Bahaman, Nazrulazhar, Abdul Kadir, Aida Fazliana

    Published 2016
    “…Many researches were conducted to study and develop new tools to overcome the problems during Economic Dispatch (ED) implementation. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    RISC-V instruction set extension on blockchain application by Cheong , Kin Seng

    Published 2024
    “…One of the most common cryptographic algorithms used in blockchain would be selected in this paper, typically djb2 hash algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  12. 12

    Development of improved metaheuristic algorithms for modelling and control of a flexible manipulator system by Nasir, Ahmad Nor Kasruddin, Ahmad, Mohd Ashraf, Raja Ismail, R. M.T., Muhammad Hamka, Embong

    Published 2019
    “…The performance of the developed algorithms are tested on various benchmark functions for both single and multiobjective type problems. …”
    Get full text
    Get full text
    Research Report
  13. 13

    Firefly analytical hierarchy algorithm for optimal allocation and sizing of distributed generation in radial distribution network by Bujal, Noor Ropidah

    Published 2022
    “…The optimisation using FAHA was carried out with the regulated voltage at the DG location during the load flow. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Modelling Autonomous Evacuation Navigation System (AENS) for optimal route using Dijkstra's algorithm by Abu Samah, Khyrina Airin Fariza

    Published 2016
    “…Through ST adaptation, all subsystems were integrated and using the “Dijkstra’s algorithm” (DA) by modifying its function from shortest path algorithm to safest and shortest algorithm, to the nearest exit. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design by Shamsiah, Suhaili, Norhuzaimin, Julai, Rohana, Sapawi, Nordiana, Rajaee

    Published 2024
    “…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design by Shamsiah, Suhaili, Norhuzaimin, Julai, Rohana, Sapawi, Nordiana, Rajaee

    Published 2024
    “…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Using genetic algorithms to optimise land use suitability by Pormanafi, Saeid

    Published 2012
    “…In this study, under environmentfriendliness objective, based on multi-agent genetic algorithms, was developed a geospatial model for the land use allocation. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Semantic analysis system by using latent semantic analysis (LSA) algorithm on khutbah texts / Ammar Zuber by Zuber, Ammar

    Published 2019
    “…The implementation phase are done by developing the project based on the Python language and also the gensim package tool that are available for use. …”
    Get full text
    Get full text
    Thesis
  20. 20

    A generalized laser simulator algorithm for optimal path planning in constraints environment by Aisha, Muhammad

    Published 2022
    “…A statistical test was used to demonstrate the efficiency of the proposed algorithm over the compared methods. …”
    Get full text
    Thesis