Search Results - (( java implication from algorithm ) OR ( using code ((using algorithm) OR (means algorithm)) ))
Search alternatives:
- java implication »
- implication from »
- using algorithm »
- means algorithm »
- from algorithm »
- using code »
-
1
Experimental implementation controlled SPWM inverter based harmony search algorithm
Published 2023Article -
2
Simulation of shortest path using a-star algorithm / Nurul Hani Nortaja
Published 2004“…The steps to calculate a shortest path using A • algorithm is shown by using appropriate examples and related figures. …”
Get full text
Get full text
Thesis -
3
Development of a hybrid dynamic fuzzy encoder and decoder model for colour QR code
Published 2022“…A new colour QR code algorithm known as a Fuzzy QR code (FQR code) was proposed to solve the problems faced by current colour QR codes. …”
Get full text
Get full text
Thesis -
4
An improved plant identification system by Fuzzy c-means bag of visual words model and sparse coding
Published 2020“…In the classic Bag of visual words model, the Fuzzy c-means algorithm is replaced with K-means and the accuracy of SIFT matching is increased. …”
Get full text
Get full text
Get full text
Article -
5
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…The methodology is based on JavaScript and PHP languages for developing a new technique called DetectCombined capable of filtering queries using parameterized queries to protect against SQL injection which is a safe method. …”
Get full text
Get full text
Get full text
Article -
6
Single Frame Profilometry With Rapid Phase Demodulation On Colour-Coded Fringes
Published 2019“…Three experiments were carried out to: (i) verify the applicability of the algorithms used in the proposed single-frame profilometry system; (ii) verify the applicability of the proposed phase error compensation algorithm; and (iii) compare the result of the proposed profilometry against the Mitutoyo CRYSTA-Plus M Series 196 coordinate-measuring machine (CMM). …”
Get full text
Get full text
Thesis -
7
Hybrid Real-Value-Genetic-Algorithm and Extended-Nelder- Mead Algorithm for Short Term Energy Demand Prediction
Published 2024“…The performance of the hybrid algorithm was compared to the hybrid Genetic Algorithm-Particle Swarm Optimisation (GA-PSO) and Real Coded-Genetic Algorithm (RC-GA) energy demand models based on the mean-absolute-percentage-error (MAPE), mean-square-error (MSE), root-mean-square-error (RMSE), and mean-absolute-deviation (MAD) error rates. …”
Get full text
Get full text
Get full text
Get full text
Article -
8
System identification using Extended Kalman Filter
Published 2017“…All the coding simulation and the results analyzed was done using Matlab programming software.…”
Get full text
Get full text
Student Project -
9
IMPLEMENTATION OF NOISE CANCELLATION WITH HARDWARE DESCRIPTION LANGUAGE
Published 2006“…The objective of this project is to implement noise cancellation technique on an FPGA using Hardware Description Language. The performance of several adaptive algorithms is compared to determine the desirable algorithm used for adaptive noise cancellation system. …”
Get full text
Get full text
Final Year Project -
10
WAVELET-DCT BASED IMAGE CODER FOR VIDEO CODING APPLICATIONS
Published 2007“…This project is about the implementation ofWavelet-DCT intra-frame coder for video coding applications. Wavelet-DCT is a novel algorithm that uses Forward Discrete Wavelet Transform (DWT) to compute DCT. …”
Get full text
Get full text
Final Year Project -
11
-
12
Analysis of Toothbrush Rig Parameter Estimation Using Different Model Orders in Real Coded Genetic Algorithm (RCGA)
Published 2024“…Generation gap used was 0.5 has shorten the algorithm conver-gence time without affecting the model accuracy.…”
Article -
13
Performance of MIMO space-time coded system and training based channel estimation for MIMO-OFDM system
Published 2006“…Therefore in this part QR decomposition algorithm has been investigated as a solution. For doing so, the performance analysis between QR decomposition and LS algorithm in terms of MSE (Mean Square Error) and BER (Bit Error Rate) has been done using simulations software. …”
Get full text
Get full text
Thesis -
14
Hybrid multiobjective genetic algorithm for integrated dynamic scheduling and routing of jobs and automated guided vehicles in flexible manufacturing systems
Published 2014“…The comparison of the result of the developed integrated algorithm using two benchmark FMS scheduling algorithms datasets is conducted. …”
Get full text
Get full text
Thesis -
15
Performance evaluation of different data aggregation algorithms for different types of sensors in WSN based cluster
Published 2018“…The algorithms applied separately with (1) Mean (2) Median (3) Mode (4) Geometric mean (5) Harmonic mean. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
16
Implementation of perez-dumortier calibration algorithm
Published 2014“…To avoid the unnecessary needs to travel to high altitude for sunphotometers calibration, Perez-Dumotier calibration algorithm has been used as an objective means to select the right intensity data so that the calibration can be performed at any altitude levels. …”
Get full text
Get full text
Get full text
Chapter In Book -
17
Rain streaks removal using total variation and sparse coding based on case based reasoning approach
Published 2024journal::journal article -
18
Experimental implementation controlled SPWM inverter based harmony search algorithm
Published 2017“…The proposed overall inverter design and the control algorithm are modelled using MATLAB environment (Simulink/m-file Code). …”
Get full text
Get full text
Get full text
Article -
19
Two-Phases QR Authentication Algorithm (2PQRA) for Digital Energy and IoT Applications
Published 2023Conference Paper -
20
Encrypting text data using elliptic curve cryptography
Published 2018“…Elliptic curve cryptography has been proven to be secure and requires small key sizes in comparison to the well-known and most used cryptographic algorithms. In this study, a new approach is proposed to enhance the performance of the encryption which means eliminating classic mapping techniques. …”
Get full text
Get full text
Thesis
