Search Results - (( developing state conversion algorithm ) OR ( java validation using algorithm ))
Search alternatives:
- conversion algorithm »
- developing state »
- state conversion »
- validation using »
- java validation »
- using algorithm »
-
1
Priority and dynamic quantum time algorithms for central processing unit scheduling
Published 2018“…Central Processing Unit is scheduled using different types of scheduling algorithms. One of the most widely algorithm used in scheduling with sharing and batch operating systems is Round Robin. …”
Get full text
Get full text
Thesis -
2
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…The simulation model was developed using Active Server Page, JavaScript and SQL 7.0 as database. …”
Get full text
Get full text
Get full text
Thesis -
3
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…In addition, the randomness of the session key generated from the MLCG is verified using NIST test suite. Besides that, the security of the proposed protocol is validated using the formal analysis tool, AVISPA. …”
Get full text
Get full text
Thesis -
4
Fuzzy logic-based hill climbing technique for photovoltaic maximum power point tracking converter
Published 2013“…Then, the proposed MPPT algorithm and dc-dc boost converter were designed and developed in the same tool. …”
Get full text
Get full text
Thesis -
5
A framework of test case prioritisation in regression testing using particle swarm-artificial bee colony algorithm
Published 2024“…Ten knowledge and domain experts provided positive feedback on the framework's verification, affirming the framework's robustness. Validation was conducted through three experiments involving four Java programs. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
6
Hill-Climbing Search (HCS) mppt algorithm for hydrokinetic energy harnessing
Published 2022“…The results show the HCS MPPT algorithm reduced the steady-state oscillation, rapid time tracking and improved 93.75% of efficiency.…”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…On the Construction phase, the development of the prototype has been started. All the algorithm for the engine has been developed by using Java script language. …”
Get full text
Get full text
Thesis -
8
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…The circuits have been designed by proteus, the microcontrollers have been programmed by micro C, and the Graphical User Interface (GUI) has been implemented in Java. Few by electronic components such as RFID, multiplexer, XBee, and servo motors have been used to realize the system. …”
Get full text
Get full text
Thesis -
9
Development of obstable avoidance system for 3D robot navigation
Published 2024“…In this project, an algorithm was developed to implement an obstacle avoidance system in 3D robot navigation. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
10
Protovoltaic boost DC/DC converter with adaptive perturb and observe-fuzzy maximum power point tracking algorithm
Published 2013“…For comparison purpose,conventional perturb and observe, and fuzzy logic control algorithms were modelled too. In hardware development, the prototype was developed and tested to verify simulation work. …”
Get full text
Get full text
Thesis -
11
Binary search algorithm as maximum power tracking technique for photovoltaic system under partial shaded conditions
Published 2018Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Variable Speed Control Of Two-Mass Wind Turbine System Via State Feedback With Adaptation Law
Published 2018“…Wind turbine convert kinetic energy from the wind to rotational energy and then to electrical energy.In a wind energy conversion system (WECS),its electrical power control (EPC) side demanded a maximum mechanical power from the mechanical power control (MPC) side despite any intermittent wind and seasonal interference.Therefore,it is necessary to develop a variable speed algorithm for a modern WECS.For a two-mass horizontal axis wind turbine, the rotor and generator stiffness is commonly being neglected in the system dynamic.The inclusion of stiffness in system dynamic introduces integral term in the system expression and hence,incur mathematical complexity in the controller design phase.Contrary,this study consider stiffness as unknown parameter in the wind turbine dynamic.In order to obtain the maximum output power,the design of an algorithm with adaptation law for the speed control of a two-mass wind turbine system with an unknown stiffness is proposed in this research.The algorithm is formulated using a full-state feedback.In pursuance of solving the tracking control as a regulation case,the speed of the turbine is bijective mapped into the error dynamic.The stability of the proposed algorithm is guaranteed by Lyapunov.The adaptation law used in the variable speed algorithm is to successfully acquire the adaptability of the algorithm towards an unknown stiffness.Therein,the estimated stiffness is augmented in the Lyapunov function.The Lie derivative of the function is made into a negative semi-definite via the non-negative control parameters.In order to control the rotor speed to sustain the optimum tip-speed ratio (TSR),as well as obtaining the maximum power output from the turbine,the proposed algorithm is constructed.A MATLAB with Simulink® toolbox is used to validate the effectiveness of the proposed control speed.The simulation result showed that the rotor speed achieved an asymptotic tracking towards the demanded rotor speed irrespective of the stiffness value.The error is proved to be minimized as the integral of absolute error (IAE) obtained for wind turbine with stiffness ranging from 134550 Nmrad-1,269100 Nmrad-1,and 403650 Nmrad-1 are recorded as 0.003088,0.003063 and 0.003088 respectively. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
13
Secure E-Voting With Blind Signature
Published 2003“…The voter’s private key for digital signature is protected by using password-based encryption with SHA and Twofish-CBC algorithm so that only valid voter can use it.…”
Get full text
Get full text
Conference or Workshop Item -
14
-
15
-
16
Application of intelligent technique for development of Colpitts oscillator
Published 2013Get full text
Get full text
Get full text
Proceeding Paper -
17
Modular motor driver with torque control for gripping mechanism
Published 2023“…In implementing the project, several algorithms were tested to achieve the torque control algorithm requirement including on-off algorithm, P algorithm, PI algorithm, PD algorithm and PID algorithm. …”
Conference paper -
18
Visualisation tool to study malaria transmission using network modelling
Published 2014“…Java was used to implement the visualisation tool. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
19
Development of nonlinear model for plug flow reactor process
Published 2010“…The steps in developing nonlinear model for plug flow reactor are developing of mathematical model in first principal including simulate under steady state and unsteady state condition, validation the mathematical model through an experimental. …”
Get full text
Get full text
Undergraduates Project Papers -
20
Arabtalk, an implementation for Arabic TTS
Published 2011“…In this framework, a mature phonology framework has been developed and many perfect rule based models were utilized in the process of letter to sound conversion. …”
Get full text
Get full text
Article
