Search Results - (( java implication based algorithm ) OR ( programming control connection algorithm ))
Search alternatives:
- connection algorithm »
- control connection »
- implication based »
- java implication »
-
1
Control algorithm for two-tank system using multiparametric programming
Published 2023“…This study proposes a control algorithm for a two-tank system based on multiparametric programming. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
2
Quality of service in mobile IP networks with parametric multi-channel routing algorithms based on linear programming approach
Published 2018“…Furthermore, Optimized Parametric Topology Control Routing algorithm performs significantly better than Triangular Routing Method and Change Foreign Agent Algorithm. …”
Get full text
Get full text
Thesis -
3
-
4
Design And Development Of Gas Argon Purging System
Published 2006“…Using AMPL (ABB Master Program Language) with ABB PLC controller is much different from Siemens or Mitsubishi PLC programming which they intended to use ladder diagram as function for the control system. …”
Get full text
Get full text
Monograph -
5
Modular motor driver with torque control for gripping mechanism
Published 2023“…In implementing the project, several algorithms were tested to achieve the torque control algorithm requirement including on-off algorithm, P algorithm, PI algorithm, PD algorithm and PID algorithm. …”
Conference paper -
6
Development of adaptive perturb and observe-fuzzy control maximum power point tracking for photovoltaic boost dc-dc converter
Published 2014“…For evaluation and comparison analysis, conventional P&O and fuzzy logic control algorithms have been developed too. All the algorithms were simulated in MATLAB-Simulink, respectively, together with PV module of Kyocera KD210GH-2PU connected to PV boost dc-dc converter. …”
Get full text
Get full text
Article -
7
Early detection and mitigation of DDoS attacks in software defined networks
Published 2018“…To detect and mitigate this attack at its early stages, an entropy-based DDoS attack detection and mitigation algorithm was proposed. The algorithm was written in Python programming language to be implementing on a POX controller. …”
Get full text
Get full text
Thesis -
8
Energy management system for optimal operation of microgrid consisting of PV, fuel cell and battery / Shivashankar Sukumar
Published 2017“…In this work, a novel ramp-rate control strategy is proposed where the energy storage is used to control the ramp-rate of PV output power within the desirable level. …”
Get full text
Get full text
Get full text
Thesis -
9
Tobi-RC mobile application: Development of remote control car program over bluetooth system / Ain Amirah Hussin
Published 2016“…This project use fuzzy control for the algorithm and Bluetooth for the technique. …”
Get full text
Get full text
Thesis -
10
System design for urban vehicle two-way connection monitoring system / Muhammad Haiqal Amiruddin
Published 2015“…Whenever the sensing module is triggered, the signal will become the input for the control unit. The action module is equipped with GPS and camera triggering and interfacing, controlled by an algorithm programmed to the suitable microcontroller platform. …”
Get full text
Get full text
Thesis -
11
A fuzzy-based PI controller for power management of a grid-connected PV-SOFC hybrid system
Published 2023Article -
12
Communication module for urban vehicle two-way connection monitoring device: article / Ahmad Kamil Mohamad Yunus
Published 2015“…The action module will cover GPS, GSM, GPRS and camera triggering and interfacing, controlled by an algorithm programmed to suitable microcontroller platform. …”
Get full text
Get full text
Article -
13
-
14
Communication module for urban vehicle two-way connection monitoring device / Ahmad Kamil Mohamad Yunus
Published 2015“…The action module will cover GPS, GSM, GPRS and camera triggering and interfacing, controlled by an algorithm programmed to suitable microcontroller platform. …”
Get full text
Get full text
Thesis -
15
A platform to develop a secure instant messaging using jabber protocol
Published 2010Get full text
Article -
16
Improving the security model of software define networks
Published 2023“…An by securing the connection between the main controller and northbound administration with the use of certain algorithm hashing protocol, it would further increase the security of the command line in the whole network. …”
text::Final Year Project -
17
Hybrid evolutionary-dolphin echolocation programming for sizing optimization of stand-alone photovoltaic systems / Zulkifli Othman
Published 2021“…Subsequently, the CI-based sizing algorithm, known as Evolutionary-Dolphin Echolocation Programming Sizing Algorithm (EDEPSA) is formulated to determine the optimal models of each system component such that either Performance Ratio (PR) or Levelized Cost of Electricity (LCOE) of the system is optimized. …”
Get full text
Get full text
Thesis -
18
-
19
Solar power inverter
Published 2013“…The controller executes the very precise algorithms required to invert the DC voltage generated by the solar module into AC This controller is programmed to perform the control loops necessary for all the power management functions necessary including DC/DC and DC/AC.…”
Get full text
Get full text
Undergraduates Project Papers -
20
Video traffic analysis on Unifi broadband network / Laina Sofia Mahamad
Published 2017“…These videos are captured based on busy hour time and non busy hour with differences of wired and wireless for six user's connections. Thirdly, to identify best traffic model based on fitted model in developing network traffic bandwidth control algorithms. …”
Get full text
Get full text
Thesis
