Search Results - (( java implementation modified algorithm ) OR ( parameter estimation connection algorithm ))
Search alternatives:
- implementation modified »
- connection algorithm »
- java implementation »
- parameter »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
Fuzzy-based multi-agent approach for reliability assessment and improvement of power system protection
Published 2015“…Meanwhile, the second MAS model has been designed using two agents as follows: the first agent is a fault current agent that is to determine the fault current at all points before and after grounding; the second agent is the time operating of the agent which is used to determine the relay operating time before and after modifying fault current. The simulation results for the first and second models are done using the data obtained from Malaysia distribution network (DISCO-Net) and 69 bus test system that were implemented using Java Agent Development Framework package software. …”
Get full text
Get full text
Thesis -
3
Parameter estimation of multivariable system using Fuzzy State Space Algorithm / Razidah Ismail … [et al.]
Published 2011Get full text
Get full text
Research Reports -
4
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
Review -
5
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
Get full text
Get full text
Thesis -
6
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
Get full text
Get full text
Conference or Workshop Item -
7
Performance Enhancement of Routing Protocols in Mobile Wireless Ad-Hoc Networks Using Fuzzy Reasoning Algorithm
Published 2006“…These applications are: route lifetime estimation, local connectivity management, nodes affinity management, and active queue management. …”
Get full text
Get full text
Thesis -
8
-
9
Sensorless Adaptive Fuzzy Logic Control Of Permanent Magnet Synchronous Motor
Published 2008“…Both experimental and simulation results obtained from the HMRASC and the position angle estimation algorithms showed superior results compared to other methods presented in the literature.…”
Get full text
Get full text
Thesis -
10
RECURSIVE LEARNING ALGORITHMS ON RBF NETWORKS FOR NONLINEAR SYSTEM IDENTIFICATION
Published 2010“…The proposed training algorithms discussed in this thesis are derived for fixed size RBF network and being compared with Extreme Learning Machine (ELM) as the ELM technique just randomly assigned centers and width of the hidden neurons and update the output connected weights. …”
Get full text
Get full text
Get full text
Thesis -
11
An Adaptive Switching Cooperative Source Searching And Tracing Algorithms For Underwater Acoustic Source Localization
Published 2019“…In addition, the ADAPSO position update equation is modified to anticipate position adjustment to ensure communication connectivity. To adaptively switches between the two algorithms, an adaptive switching algorithm based on a Generalized Likelihood Ratio Test (GLRT) is proposed. …”
Get full text
Get full text
Thesis -
12
Control algorithm for two-tank system using multiparametric programming
Published 2023“…Results show accurate and robust regulation of liquid levels, minimizing control effort and making it suitable for systems with dynamic variations or parameter uncertainties. In conclusion, the implementation of multiparametric programming is able to estimate the value of the output for the control algorithm of the two-tank system.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
Reliability performance evaluation and integration of routing algorithm in shuffle exchange with minus one stage
Published 2012“…These routing algorithms are Zero X, Zero Y, ZeroYbit, ZeroXbit, Sequential Increasing and Sequential Decreasing Algorithm. …”
Get full text
Get full text
Thesis -
14
Diagonalization of covariance matrix in simultaneous localization and mapping of mobile robot
Published 2019“…The multiplications of the covariance matrix with other parameters will cause the increments of its dimension, which is twice the number of landmarks and result in erroneous estimation. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Grey wolf optimization for enhanced performance in wind power system with dual-star induction generators
Published 2025“…These algorithms play a crucial role in estimating the optimal values of Kp, Ki, and Kd for the PID speed controller, as well as Kp and Ki for the PI controller used in the flux, DC-link voltage, and grid connection for wind energy conversion system based dual-star induction generator. …”
Article -
16
Bayesian logistic regression model on risk factors of type 2 diabetes mellitus
Published 2016“…The significant variables determined by maximum likelihood method were then estimated using the BLR method. The BLR approach via Gibbs sampler and the random walk metropolis algorithm suggests that family history of diabetes, waist circumference and the body mass index are the significant risk factors associated with the type 2 diabetes mellitus. …”
Get full text
Get full text
Thesis -
17
Reproducing kernel Hilbert space method for cox proportional hazard model
Published 2016“…This algorithm is used to determine the vector i a that enables us to find the optimal parameters of ƒ(x)which is simplified as F(x)= ∑aᵢK(x,xᵢ) . …”
Get full text
Get full text
Get full text
Thesis -
18
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
19
Machine-learning-based adaptive distance protection relay to eliminate zone-3 protection under-reach problem on statcom-compensated transmission lines
Published 2020“…The prior result from the Matlab model of the adaptive numerical distance relay connected on midpoint integrated STATCOM power grid system indeed establish the existence of the under-reach effect for the relay zone-3 elements ing far-end short circuit fault at the coverage boundary leading to wrong impedance estimation. …”
Get full text
Get full text
Thesis -
20
Modeling of cupping suction system based on system identification method
Published 2022“…By minimizing integral square errors, fractional order model parameters were optimized (ISE). The results reveal that the better the precision of the modelling cupping system parameter, the lower the error. …”
Get full text
Get full text
Undergraduates Project Papers
