Search Results - (( exploring consumer control algorithm ) OR ( java application optimisation algorithm ))
Search alternatives:
- application optimisation »
- optimisation algorithm »
- consumer control »
- java application »
-
1
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
Get full text
Get full text
Get full text
Article -
2
Modeling and Simulation of Swarm Intelligence Algorithms for Parameters Tuning of PID Controller in Industrial Couple Tank System
Published 2014“…In liquid-based product manufacturing system, one of the main components consists of an industrial tank. This paper explores the applications of two swarm intelligence algorithms in optimizing the PID controller parameters. …”
Get full text
Get full text
Get full text
Article -
3
Modeling and Simulation of Swarm Intelligence Algorithms for Parameters Tuning Of PID Controller in Industrial Couple Tank System
Published 2014“…In liquid-based product manufacturing system, one of the main components consists of an industrial tank. This paper explores the applications of two swarm intelligence algorithms in optimizing the PID controller parameters. …”
Get full text
Get full text
Article -
4
Web-based expert system for material selection of natural fiber- reinforced polymer composites
Published 2015“…Finally, the developed expert system was deployed over the internet with central interactive interface from the server as a web-based application. As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
Get full text
Get full text
Thesis -
5
Model-Based Design (MBD) for autonomous underwater vehicle
Published 2019Get full text
Get full text
Get full text
Article -
6
Scheduling strategy of a cloud-based virtual energy storage system (VESS) for achieving energy saving
Published 2024“…Besides, the case studies also underscore the performance analysis of the PID and Fuzzy PID control algorithms. The results show that the cooling system consume higher energy in the summer season due to the greater ambient temperature. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
7
A Metaheuristic Optimization Using Explosion Method On A Hybrid Pd2-Lqr Quadcopter Controller
Published 2021“…The problem with this method was that it very time-consuming, and the control designer could never tell which gains are the optimal solution for the controller. …”
Get full text
Get full text
Thesis -
8
-
9
-
10
Deploying clustered wireless sensor network by multi-robot system
Published 2014Get full text
Get full text
Conference or Workshop Item -
11
Algorithm for the legal regulation of internet financial crime
Published 2024“…To prevent crime, attention towards effective control of Internet finance crime has grown, emphasizing the protection of consumers’ rights, reduction of economic damage, and promotion of Internet finance development. …”
Get full text
Get full text
Get full text
Article -
12
-
13
Tracking mosquito-borne diseases via social media: a machine learning approach to topic modelling and sentiment analysis
Published 2024“…Mosquito-borne diseases (MBDs) are a major threat worldwide, and public consultation on these diseases is critical to disease control decision-making. However, traditional public surveys are time-consuming and labor-intensive and do not allow for timely decision-making. …”
Get full text
Get full text
Get full text
Get full text
Article -
14
Multi-Agent cubature Kalman optimizer: A novel metaheuristic algorithm for solving numerical optimization problems
Published 2024“…CTT can use small values for parameters P(0), Q, and R, so CKF was developed to overcome KF and other estimation algorithms. Moreover, in CTT, the term local neighborhoods is used to propagate the cubature point in local search, where the radius, δ, of local search is updated in every iteration to balance between the exploration and exploitation processes. …”
Get full text
Get full text
Get full text
Article -
15
A new mobile malware classification for SMS exploitation
Published 2024“…Mobile malware is ubiquitous in many malicious activities such as money stealing. Consumers are charged without their consent. This paper explores how mobile malware exploit the system calls via SMS. …”
Conference Paper -
16
Generation of the batik Terengganu motifs using Bezier curve and Dejdumrong curve / Nuralea Natasya Amir Hamdan, Nur Fatin Natasya Ramdzan and Nurul Ain Nabila Mohamad Latif
Published 2023“…However, this manual process is time-consuming and limits the exploration of complex designs. …”
Get full text
Get full text
Student Project -
17
Development of adaptive controlled natural gas transmission water bath heater using mathematical model / Amiruddin Amkaromi
Published 2018“…This thesis explores application of adaptive control in water bath heater. …”
Get full text
Get full text
Thesis -
18
Evaluation of Security Metric for Artificial Internet of Things Smart Locking System
Published 2023“…Modern technologies are being explored and utilise to accomplish this objective. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
19
-
20
