Search Results - (( frames generation based algorithm ) OR ( java location based algorithm ))
Search alternatives:
- frames generation »
- generation based »
- java »
-
1
A simplified synchronous reference frame for indirect current controlled three-level inverter-based shunt active power filters
Published 2016“…This paper presents a new simplified harmonics extraction algorithm based on the synchronous reference frame (SRF) for an indirect current controlled (ICC) three-level neutral point diode clamped (NPC) inverter-based shunt active power filter (SAPF). …”
Get full text
Get full text
Article -
2
-
3
Group formation using genetic algorithm
Published 2009“…However, due to lack of programming skills especially in Java programming language and the inability to have meetings frequently among the group members,most of the students’ software project cannot be delivered successfully.To solve this problem, systematic group formation is one of the initial factors that should be considered to ensure that every group consists of quality individuals who are good in Java programming and also to ensure that every group member in a group are staying closer to each other.In this research, we propose a method for group formation using Genetic Algorithms, where the members for each group will be generated based on the students’ programming skill and location of residential colleges.…”
Get full text
Get full text
Get full text
Get full text
Monograph -
4
Efficient tag grouping RFID anti-collision algorithm for internet of things applications based on improved k-means clustering
Published 2023“…Dynamic Frame Slotted ALOHA (DFSA) is a de facto algorithm in the EPC Global Class-1 Generation-2 protocol for Radio Frequency Identification (RFID) tag collision problem. …”
Get full text
Get full text
Article -
5
Multi-floor indoor location estimation system based on wireless local area network
Published 2007“…The most probable match is selected and returned as estimated location based on Bayesian filtering algorithm. Estimated location is reported as physical location and symbolic location. …”
Get full text
Get full text
Thesis -
6
802.11 MAC layer sniffer using spoof detection algorithm / Azwan Abdul Satar
Published 2007“…The wireless sniffer implements sequence number-based spoofing detection algorithm in its processing. …”
Get full text
Get full text
Thesis -
7
REGION-BASED ADAPTIVE DISTRIBUTED VIDEO CODING CODEC
Published 2011“…The practical application of DVC is referred to as Wyner-Ziv video coding (WZ) where an estimate of the original frame called "side information" is generated using motion compensation at the decoder. …”
Get full text
Get full text
Thesis -
8
Video abstraction using density-based clustering algorithm
Published 2017“…The existing abstraction approaches have commonly relied on global characteristics of visual content and neglected the local details of video frames. This paper presents an enhanced video abstraction approach called Density-based Surveillance video abstraction (DbSva) to generate a static short-length video. …”
Get full text
Get full text
Get full text
Article -
9
PLL-less SRF technique for operation of SAPF under unbalanced and distorted supply voltage
Published 2018“…Therefore, this paper presents a PLL-less SRF algorithm for generating reference current to effectively control performance of a SAPF developed based on three-level neutral-point-clamped (NPC) inverter. …”
Get full text
Get full text
Conference or Workshop Item -
10
-
11
A Reinforcement Learning Based Adaptive ROI Generation for Video Object Segmentation
Published 2021“…Furthermore, relocating the segmentation target in the next frame is difficult if it is lost in the current frame during the segmentation process. …”
Get full text
Get full text
Article -
12
False path identification algorithm framework for nonseparable controller-data path circuits
Published 2016“…This paper proposes an algorithm frame-work to deal with these false paths through identification for DFT test. …”
Get full text
Get full text
Conference or Workshop Item -
13
Energy-driven scheduling for Digital Video Broadcasting - Satellite Second Generation (DVB-S2)
Published 2013“…Based on energy efficiency of each modulation and coding scheme (MODCOD) available in Digital Video Broadcasting - Satellite Second Generation (DVB-S2), the EEF algorithm improves a scheduling mechanism of a two-step scheduler by selecting frames to be transmitted next according to “energy efficiency” policy developed. …”
Get full text
Get full text
Conference or Workshop Item -
14
SLAMM: Visual monocular SLAM with continuous mapping using multiple maps
Published 2018“…Similarly, maps generated from multiple robots are merged without prior knowledge of their relative poses; which makes this algorithm flexible. …”
Get full text
Get full text
Article -
15
Noise power estimation for broadcasting OFDM systems
Published 2017“…Compared with the conventional preamble-based scheme, the proposed pilot-based noise algorithm generates near-ideal accuracy at different values of signal-to-noise ratio (SNR). …”
Get full text
Get full text
Article -
16
-
17
Fuzzy logic controller based three phase shunt active power filter for harmonics reduction
Published 2014Get full text
Conference or Workshop Item -
18
A fuzzy approach for early human action detection / Ekta Vats
Published 2016“…The fuzzy membership function generated frame-by-frame from fuzzy BK subproduct provides the basis to detect an action before it is completed, when a certain threshold is attained in a suitable way. …”
Get full text
Get full text
Thesis -
19
Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform
Published 2009“…The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…Subsequently, this project embedded with a lightweight Geo-Encryption algorithm to preserve the privacy of real-time GPS location. …”
Get full text
Get full text
Get full text
Academic Exercise
