Search Results - (( java implication based algorithm ) OR ( value implementation drops algorithm ))

  • Showing 1 - 11 results of 11
Refine Results
  1. 1

    Experimental implementation controlled SPWM inverter based harmony search algorithm by Najeeb, Mushtaq, Mansor, Muhamad, Razali, Ramdan, Daniyal, Hamdan, A. F. Yahaya, Jabbar

    Published 2017
    “…Then, the control algorithm of the inverter prototype is experimentally implemented using the eZdsp F28355 board along with the bipolar sinusoidal pulse width modulation (SPWM) to control the output voltage drop under different load conditions. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    DEVELOPMENT OF NODE RELIABILITY DETECTION ALGORITHM FOR WIRELESS SENSOR NETWORKS by AZMAN, MOHAMAD AFIQ

    Published 2014
    “…The proposed algorithm is then implemented on hardware compounding of several IRIS sensor motes. …”
    Get full text
    Get full text
    Final Year Project
  3. 3

    DEVELOPMENT OF NODE RELIABILITY DETECTION ALGORITHM FOR WIRELESS SENSOR NETWORKS by AZMAN, MOHAMAD AFIQ

    Published 2014
    “…The proposed algorithm is then implemented on hardware compounding of several IRIS sensor motes. …”
    Get full text
    Get full text
    Final Year Project
  4. 4
  5. 5

    Quranic Cross-Lingual Information Retrieval Optimization using Hexadecimal Conversion Algorithm by Mazlan,M.M., Ismail,R., Norita Md. Norwawi, Fauziah Abdul Wahid

    Published 2024
    “…This article highlights the proposed Quranic Cross-Lingual Information Retrieval (Q-CLIR) model and Hexadecimal Conversion Algorithm. Currently, QuHex is still undergoing a continuous prototyping development and will implement the 2nd phase in creating interpreter for any word in a hex value. …”
    Article
  6. 6
  7. 7
  8. 8

    Modified hybrid median filter for removal of low density random-valued impulse noise in images / Dr. Siti Noraini Sulaiman ... [et al.] by Sulaiman, Siti Noraini, Isa, Iza Sazanita, Hussain, Zakaria, Md Tahir, Nooritawati, Mat Isa, Nor Ashidi

    Published 2017
    “…There are two common types of IN models defined in image processing; Fixed-Valued Impulse Noise (FIN) and Random-Valued Impulse Noise (RVIN). …”
    Get full text
    Get full text
    Research Reports
  9. 9

    Fractal coding of bio-metric image for face authentication by Ahadullah, Md

    Published 2021
    “…This thesis examines how fractal image coding is used in biometric cryptography for personal face authentication. This thesis implements the algorithms for the Methods of CPM, BPBM fractal coding, and its application. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Predictive Mobility Management Using Optimized Delays And Security Enhancements In IEEE 802.11 Infrastructure Networks by Biju, Issac

    Published 2008
    “…Under the current technology, when a mobile node moves from one access point to another, the handoff is not always smooth and connection may be dropped as a result. The reason for that is inherent in the mobility design problems of the existing implementations. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Meta-heuristic approaches for reservoir optimisation operation and investigation of climate change impact at Klang gate dam by Lai, Vivien Mei Yen

    Published 2023
    “…At the same time, the HHO and OBL-HHO algorithms resulted in lower levels of periodic reliability, with values of 13.16% and 9.21% respectively. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis