Search Results - (( java application using algorithm ) OR ( (parameter OR parameters) estimation device algorithm ))
Search alternatives:
- java application »
- device algorithm »
- using algorithm »
-
1
-
2
-
3
Codebook excited linear predictive coding
Published 2011Get full text
Get full text
Get full text
Book Chapter -
4
Differential evolution algorithm for linear frequency modulation radar signal denoising
Published 2013“…This paper looks at the feasibility of using the differential evolution algorithm to estimate the linear frequency modulation received signal parameters for radar signal denoising. …”
Get full text
Get full text
Conference or Workshop Item -
5
-
6
Hybrid fuzzy-sliding mode observer design for estimation and advanced control of an ethylene polymerization process / Jarinah Mohd Ali
Published 2017“…Observers are computational algorithms designed to estimate unmeasured state variables due to the lack of appropriate estimating devices or to replace the high-priced sensors in a plant. …”
Get full text
Get full text
Get full text
Thesis -
7
Joint torque estimation model of surface electromyography(sEMG) based on swarm intelligence algorithm for robotic assistive device
Published 2014“…Particle swarm optimization (PSO) has been applied as a control algorithm for a number of selected mathematical models. sEMG signals were determined as input data to the mathematical model where parameters of the mathematical model were optimized using PSO. …”
Get full text
Get full text
Conference or Workshop Item -
8
Cutting Parameters Optimization of Mild Steel via AIS Heuristics Algorithm
Published 2014“…The optimum cutting parameters (cutting velocity, depth of cut and feed rate) calculated by (AIS) algorithm to obtain the simulated and ideal cutting temperature and surface roughness. …”
Get full text
Get full text
Conference or Workshop Item -
9
-
10
Wind Turbines: Novel Control Algorithm in Region II
Published 2014Get full text
Get full text
Get full text
Get full text
Article -
11
Evaluating power efficient algorithms for efficiency and carbon emissions in cloud data centers: a review
Published 2015“…CloudSim simulator is used to implement the algorithms on an IaaS cloud infrastructure, to calculate the power consumption, and to analyze each algorithm's behavior for different parameters. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
12
Machine-learning-based adaptive distance protection relay to eliminate zone-3 protection under-reach problem on statcom-compensated transmission lines
Published 2020“…The estimated fault impedance value by the zone-3 elements is slightly higher than the actual pre-fault estimated threshold value under normal operating conditions. …”
Get full text
Get full text
Thesis -
13
Particle filter approach for estimating indoor mobile user location using IEEE 802.11 signals (F1090)
Published 2011“…Moreover, the use of light estimation algorithms such as fingerprinting, ranking algorithm, Weighted Centroid method, k-Nearest Neighbour, did not give a good tracking result. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
14
-
15
-
16
Particle filter approach for tracking indoor user location using IEEE 802.11 signals
Published 2011“…Moreover, the use of light estimation algorithms such as fingerprinting, ranking algorithm, Weighted Centroid method, k-Nearest Neighbour, did not give a good tracking result. …”
Get full text
Get full text
Get full text
Article -
17
Kernel and multi-class classifiers for multi-floor wlan localisation
Published 2016“…The multi-class classification strategy is used to ensure quick estimation of the multi-class NN algorithms. All of the algorithms are later combined to provide device location estimation for multi-floor environment. …”
Get full text
Get full text
Thesis -
18
Multi-observers of particle filter approach for estimating indoor mobile user location
Published 2011“…To make the estimation accurate, the real time data of multi-observer Wi-Fi signals is used. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
19
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
20
