Search Results - (( java implementation change algorithm ) OR ( basic implementation force algorithm ))
Search alternatives:
- implementation change »
- basic implementation »
- implementation force »
- java implementation »
- change algorithm »
- force algorithm »
-
1
Integrating fuzzy logic and brute force algorithm in optimizing energy management systems for battery electric vehicles
Published 2023“…This research proposes a solution to achieve more efficient control of HVAC consumption by integrating fuzzy logic techniques with brute-force algorithms to optimize the Energy Management System (EMS) in BEVs. …”
Get full text
Get full text
Get full text
Article -
2
Integrating fuzzy logic and brute force algorithm in optimizing Energy Management Systems for Battery Electric Vehicles
Published 2024“…This research proposes a solution to achieve more efficient control of HVAC consumption by integrating fuzzy logic techniques with brute-force algorithms to optimize the Energy Management System (EMS) in BEVs. …”
Get full text
Get full text
Get full text
Article -
3
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…The algorithm is implemented as a plugin. It does not interfere with the web application original code. …”
Get full text
Get full text
Conference or Workshop Item -
4
An Educational Tool Aimed at Learning Metaheuristics
Published 2020“…This tool can be an educational assistant for beginners to learn metaheuristic in theoretical lectures as well as practical sessions. Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Development of airbag suit system for motorcyclist
Published 2014Get full text
Get full text
Get full text
Article -
6
Data Hiding Techniques In Digital Images
Published 2003“…After all these studies, one of the algorithms in the masking technique is developed and implemented using JAVA program to embed message into true color image with a good quality and higher capacity. …”
Get full text
Get full text
Thesis -
7
Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
Published 2009“…The aim of this paper is implementation of system computation between Cryptography and Steganography which embeds information in unused area 2 within EXE files to find a secure solution to cover file without change the size of cover file. …”
Get full text
Get full text
Get full text
Article -
8
-
9
Development of control algorithm for a new 12s-6p single phase field excited flux switching motor
Published 2020“…For position detection, algorithms merely need a basic infrared transceiver sensor. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
11
-
12
POISSON EQUATION FOR ELECTROSTATIC FIELD USING THE FINITE DIFFERENCE METHOD
Published 2019“…It is a useful approach to the calculation to relate the charge density by the divergence relationship. The basic main equations are derived directly so that the algorithm can be extended from the classical Poisson equation to the generalized Poisson equation in order to include the effects of varying dielectrics within the domain. …”
Get full text
Get full text
Final Year Project Report / IMRAD -
13
Optimization and prediction of battery electric vehicle driving range using adaptive fuzzy technique
Published 2022“…The work in this thesis is expected to be the best approach in formulating an adaptive fuzzy technique based on brute force and regression algorithms for optimization and prediction of EMS in BEV application.…”
Get full text
Get full text
Thesis -
14
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
15
Efficient beamforming and spectral efficiency maximization in a joint transmission LTE-A system
Published 2016“…Moreover, addressing the lack-of-diversity issue in Basic Particle Swarm Optimization Algorithm (BPSOA) is a primary concern of this work. …”
Get full text
Get full text
Thesis -
16
Controlling An-Inverted Pendulum System Using A Microcontroller
Published 2022“…Particularly during movement, a well-implemented TWSB robot is able to maintain an upright stance. …”
Get full text
Get full text
Monograph -
17
Form Finding And Shape Change Analysis Of Spine Inspired Bio-Tensegrity Model
Published 2017“…The shape change of SBS models towards target state is achieved by means of forced elongation of cable. Computational strategies for the shape change consist of two stages: the derivation of incremental equilibrium equations and optimization of the cables forced elongation by sequential quadratic programming. …”
Get full text
Get full text
Thesis -
18
An overview on real-time control schemes for wheeled mobile robot
Published 2018“…Four main categories for wheeled mobile robot control systems have been found in literature which are namely: Kinematic based controller, Dynamic based controllers, artificial intelligence based control system, and Active Force control. A MATLAB/Simulink software is the main software to simulate and implement the control system. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Challenges of hidden data in the unused area two within executable files
Published 2009“…Results: The programs were coded in Java computer language and implemented on Pentium PC. …”
Get full text
Get full text
Get full text
Article -
20
Evolutionary cost-cognizant regression test case prioritization for object-oriented programs
Published 2019“…TCS attempts to identify test cases that have the same relevance to some set of changes. This technique has the problem of selecting a significant number of test cases even for small changes made to a software. …”
Get full text
Get full text
Thesis
