Search Results - (( development under normalization algorithm ) OR ( java application customization algorithm ))
Search alternatives:
- normalization algorithm »
- customization algorithm »
- under normalization »
- development under »
- java application »
-
1
A new method for intermediate power point tracking for PV generator under partially shaded conditions in hybrid system
Published 2018“…An optimized control technique for hybrid power generation system is developed in this study to work in both cases with high accuracy and good efficiency, under normal or partially shaded conditions. …”
Get full text
Get full text
Article -
2
Multi-sources model and control algorithm of an energy management system
Published 2012“…The results show that the designed vehicle’s speed and load power closely match those of the ECE-47 test driving cycle under normal and heavy load conditions. This study’s results suggest that the proposed control algorithm provides an efficient and feasible EMS for LEV.…”
Get full text
Get full text
Article -
3
Algorithm for calculation of cephalometric soft tissue facial traits
Published 2007“…This paper presents development of a new soft tissue analysis algorithm, which will be used as an analysis tool in Computer Assisted Craniofacial Surgery Planner – a surgery planning system under development. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Taguchi?s T-method with Normalization-Based Binary Bat Algorithm
Published 2025“…Therefore, a variable selection technique using a swarm-based Binary Bat algorithm is proposed. Specifically, a normalization-based Binary Bat algorithm is used, where discretization of continuous solution into binary form is performed using a normalization equation. …”
Conference paper -
5
Adaptive policing and shaping algorithms on inbound traffic using generalized Pareto distribution / Nor Azura Ayop
Published 2016“…Log likelihood estimation technique is used to fit the best 2-parameter CDF compared to Weibull, Normal and Rician distribution model. The percentage level 5% under original bandwidth used is developed on policing and shaping algorithms to control bandwidth used. …”
Get full text
Get full text
Thesis -
6
Enhanced dynamic security assessment for power system under normal and fake tripping contingencies.
Published 2019“…The results indicate that the hybrid LMT accurately assesses the dynamic security status of the system under normal and fake tripping contingencies with short time frame. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
An Energy Management of Light Electric Vehicle
Published 2013“…In this paper, a state-based logic control algorithm is developed for a multi-source EMS for light electric vehicle, i.e.…”
Get full text
Get full text
Article -
8
-
9
Adaptive policing and shaping algorithms on inbound traffic using generalized Pareto distribution: article / Nor Azura Ayop
Published 2016“…Log likelihood estimation technique is used to fitted the best 2-parameter CDF compared to WeibuII, Normal and Rician distribution model. The percentage level 5% under original bandwidth used is developed on policing and shaping algorithms to control bandwidth used. …”
Get full text
Get full text
Article -
10
Optimization of zinc oxide surge arrester design in reducing leakage current / Nurul Ain Abdul Latiff
Published 2018“…A three-dimensional (3D) 11kV surge arrester model in finite element method (FEM) was developed and used to simulate the leakage current under normal operating condition. …”
Get full text
Get full text
Get full text
Thesis -
11
Feature extraction from oil palm in vitro shoot images
Published 2010“…The feature extraction techniques are discussed in this article. The algorithms and methods developed are robust and advanced enough to be used in combination with a machine vision algorithm and automation system. …”
Get full text
Get full text
Article -
12
Development of Finite Element Code for Non-Linear Analysis of Interlocking Mortarless Masonry System
Published 2006“…An incremental-iterative 2-D nonlinear finite element code is developed to implement the proposed algorithm and analyze the masonry system till failure. …”
Get full text
Get full text
Thesis -
13
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
14
Numerical algorithm of block method for general second order ODEs using variable step size
Published 2017“…This paper outlines an alternative algorithm for solving general second order ordinary differential equations (ODEs). …”
Get full text
Get full text
Get full text
Article -
15
-
16
Dynamic Robust Bootstrap Algorithm for Linear Model Selection Using Least Trimmed Squares
Published 2009“…We modified the classical bootstrapping algorithm by developing a mechanism based on the robust LTS method to detect the correct number of outliers in the each bootstrap sample. …”
Get full text
Get full text
Thesis -
17
802.11 MAC layer sniffer using spoof detection algorithm / Azwan Abdul Satar
Published 2007“…The testing of the wireless sniffer prototype was evaluated against four wireless traffic simulations under normal, spoofing, AP misconfiguration, high loss and retransmitted fi-ames conditions. …”
Get full text
Get full text
Thesis -
18
Numerical algorithm of block method for general second order ODEs using variable step size
Published 2017“…This paper outlines an alternative algorithm for solving general second order ordinary differential equations (ODEs). …”
Get full text
Get full text
Get full text
Article -
19
-
20
