Search Results - (( java application customization algorithm ) OR ( outsider simulation based algorithm ))
Search alternatives:
- customization algorithm »
- outsider simulation »
- java application »
- simulation based »
-
1
Fault detection and diagnosis using rule-based support system on fatty acid fractionation column
Published 2003“…Process variables are defined as fault if they are deviated outside this region. Identification of causes, consequences and suggested actions for each deviation assisted by Hazard and Operability Study (HAZOP) analysis are generated into rule-based algorithm. …”
Get full text
Get full text
Article -
2
Resource allocation techniques for interference mitigation in macro and femtocell heterogeneous network-based LTE system
Published 2017“…The first proposed hybrid approach consists of two combined schemes, termed as Resource Allocation based Fractional Frequency Reuse and Graph Connectivity algorithm (RAFFRGC). …”
Get full text
Get full text
Get full text
Thesis -
3
Network analysis in a peer-to-peer energy trading model using blockchain and machine learning
Published 2024“…This will lead to profitable P2P energy trading between different distributed prosumers. By analyzing the simulation results of the proposed model and algorithm by benchmarking with the existing state-of-the-art techniques it's clear that the proposed algorithm shows marked improvement over network latency generated results. …”
Get full text
Get full text
Article -
4
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
5
A Web Based System For Evaluating Occupational Stress
Published 2007Get full text
Get full text
Get full text
Article -
6
POWER QUALITY CLASSIFICATION WITH DE-NOISING SCHEME USING WAVELET TRANSFORM AND RULE- BASED METHOD
Published 2012“…Unique features from the I", 4t h ,7th and 8thl evel details are obtained as criteria for developing a Rules-Based Algorithm for classifying disturbances that have occurred. …”
Get full text
Get full text
Thesis -
7
Medium access control protocol based on time division multiple access scheme for wireless body area network
Published 2024“…The proposed protocol is compared to the IEEE 802.15.6 MAC, enhanced packet scheduling algorithm MAC (EPSA-MAC), and concurrent MAC (C-MAC) protocols based on the performance metrics of packet delivery ratio (PDR), network throughput, energy consumption, and average delay. …”
Get full text
Get full text
Get full text
Get full text
Article -
8
WIMAX TESTBED
Published 2008“…This Final Year Project attempts to simulate via Simulink, the working mechanism of a WiMAX testbed that includes a transmitter, channel and receiver. …”
Get full text
Get full text
Final Year Project -
9
Support vector machine for day ahead electricity price forecasting
Published 2023“…Many factors cause for price spikes such as volatility in load and fuel price as well as power import to and export from outside the market through long term contract. This paper introduces an approach of machine learning algorithm for day ahead electricity price forecasting with Least Square Support Vector Machine (LS-SVM). …”
Conference Paper -
10
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Cyber vulnerabilities in smart grid and safety measures for energy meters in advanced metering system and smart meter communications
Published 2023“…It also uses chaos based key generation as well as public key-based authentication techniques. …”
Article -
12
Modified sequential fences for identifying univariate outliers
Published 2016“…Furthermore, a new approach is proposed by considering the skewness of underlying distribution to increase efficiency of sequential fences in skewed distribution. Conclusively, based on the numerical examples and simulation study, newly proposed method has been adjusted according to the skewness of the underlying distribution of data. …”
Get full text
Get full text
Thesis -
13
-
14
Industrial datasets with ICS testbed and attack detection using machine learning techniques
Published 2021“…An innovative concept of using real operational technology network traffic-based testbed, for cyber-physical system simulation and analysis, is presented. …”
Get full text
Get full text
Get full text
Get full text
Article -
15
Digital closed loop controller of hydraulic cylinder using linear transducer / Mohd. Aizuddin Khalid
Published 2010“…SIMULINK is integrated with MATLAB, providing immediate access to an extensive range of tools that can develop algorithms, analyze and visualize simulations, customize the modeling environment, define signal, parameter, and test data. …”
Get full text
Get full text
Thesis -
16
