Search Results - (( development under implementation algorithm ) OR ( java data function algorithm ))
Search alternatives:
- implementation algorithm »
- under implementation »
- function algorithm »
- development under »
- data function »
- java »
-
1
Fuzzy modeling using Bat Algorithm optimization for classification
Published 2018“…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
2
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
3
Dual search maximum power point algorithm based on mathematical analysis under partially-shaded conditions
Published 2016“…Moreover, it is very important that the algorithms should be general and not so complicated which could be implemented for all systems.Therefore, this research presents design and development of a novel method, which is called dual search maximum power point (DSMPP) algorithm, for tracking the GMPP under PSCs. …”
Get full text
Get full text
Thesis -
4
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
5
A new method for intermediate power point tracking for PV generator under partially shaded conditions in hybrid system
Published 2018“…Finally, the combined control algorithm was implemented using a DSpace 1104 environment and extensively tested under various partially shaded patterns. …”
Get full text
Get full text
Article -
6
Web-based RIG performance reporting system using interactive visualization techniques / Amir Hambaly Nasaruddin
Published 2019“…For the user to analyze the result, the system provides visual analytics technique which can educate the user on analyzing the result which is drill down and sorting function to educate users. The result of this project is all algorithm for visualizing data is functioning and the output produced from the system is correct and effective. …”
Get full text
Get full text
Thesis -
7
Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
Published 2009“…The system includes two main functions; first is the hiding of the information in unused area 2 of PE-file (.EXE file), through the execution of four process (specify the cover file, specify the information file, encryption of the information, and hiding the information) and the second function is the extraction of the hiding information through three process (specify the steno file, extract the information, and decryption of the information) and The proposed system is implemented by using java.…”
Get full text
Get full text
Get full text
Article -
8
Investigation and modelling of building energy management system for sustainable energy usage
Published 2024text::Final Year Project -
9
Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter
Published 2019“…It does not consider the LACE algorithm implemented in huge number of server in one Cloud datacenter. …”
Get full text
Get full text
Thesis -
10
An efficient control implementation for inverter based harmony serach algorithm
Published 2017“…This research implements a PI controller based on harmony search (HS) optimization algorithm for voltage source inverter to improve the output performance under step load change conditions. …”
Get full text
Get full text
Get full text
Article -
11
Development of Finite Element Code for Non-Linear Analysis of Interlocking Mortarless Masonry System
Published 2006“…An incremental-iterative 2-D nonlinear finite element code is developed to implement the proposed algorithm and analyze the masonry system till failure. …”
Get full text
Get full text
Thesis -
12
An Efficient Control Implementation for Inverter Based Harmony Search Algorithm
Published 2017“…This research implements a PI controller based on harmony search (HS) optimization algorithm for voltage source inverter to improve the output performance under step load change conditions. …”
Get full text
Get full text
Get full text
Article -
13
Fuzzy logic-based hill climbing technique for photovoltaic maximum power point tracking converter
Published 2013“…Then, the proposed MPPT algorithm and dc-dc boost converter were designed and developed in the same tool. …”
Get full text
Get full text
Thesis -
14
Hardware Implementation Of Rc4a Stream Cipher Algorithm
Published 2007“…The hardware implementation of cryptographic algorithms plays an important role because of growing requirements of high speed and high level secure communications. …”
Get full text
Get full text
Thesis -
15
Challenges of hidden data in the unused area two within executable files
Published 2009“…The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
Get full text
Get full text
Get full text
Article -
16
Moth flame optimization maximum power point tracking algorithm for photovoltaic system under partial shaded conditions
Published 2022“…The study aims to identify the performance of MFO based MPPT algorithm under partial shaded conditions. A simulation model of MFO based MPPT algorithm was developed and implemented with DC/DC boost converter in MATLAB Simulink. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Design issues and challenges of an FPGA-based orthogonal matching pursuit implementation for compressive sensing reconstruction
Published 2020Get full text
Get full text
Conference or Workshop Item -
18
-
19
Development of Real-Time Eye Tracking Algorithm
Published 2021“…This project develops a real-time eye tracking algorithm to improve the accuracy of iris detection and gaze classification. …”
Get full text
Get full text
Conference or Workshop Item -
20
Conceptual framework for lightweight ciphertext policy-attribute based encryption scheme for internet of things devices / Norhidayah Muhammad and Jasni Mohamad Zain
Published 2019“…There are AES, PRESENT, Hash algorithm declared as a lightweight algorithm under consideration in ISO/IEC 29192 “Lightweight Cryptography”. …”
Get full text
Get full text
Get full text
Article
