Search Results - (( java implication tree algorithm ) OR ( program home based algorithm ))

  • Showing 1 - 14 results of 14
Refine Results
  1. 1

    Optimal Strategy for Comfort-Based Home Energy Management System Considering Impact of Battery Degradation Cost Model by Han B., Zahraoui Y., Mubin M., Mekhilef S., Seyedmahmoudian M., Stojcevski A.

    Published 2024
    “…However, few of the previous works study the impact of different models of battery degradation cost in the optimization strategy of a comfort-based HEMS framework. In this paper, a novel scheduling algorithm based on a mixed-integer programming (MIP) model is proposed for the HEMS. …”
    Article
  2. 2

    Performance Analysis In IoT Based Home Automation Using Hybrid RS-LDPC Codes by Ng, Lay Wei

    Published 2018
    “…The error detection and correction algorithms implemented in home automation system is successfully developed by encoding and decoding the text messages that transmitted from webpage to Raspberry Pi board using Python and HTML programming language. …”
    Get full text
    Get full text
    Monograph
  3. 3

    Linear programming approach for scheduling sports league problems in Malaysia by Ahmad Rosdi, Muhammad Ifwat

    Published 2017
    “…In this thesis we propose to formulate a linear programming (LP) model to schedule sports league problems in Malaysia whereby the tournament style will be definitely different from Home-Away restriction. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Smart biosecurity door locking system / Nur Nadia Syahirah ‘Asri by ‘Asri, Nur Nadia Syahirah

    Published 2017
    “…Furthermore, the system was developed using Fingerprint Matching Algorithm (FMA), Image Processing technique and embedded programming technique. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6
  7. 7

    DC-based PV-powered home energy system by Sabry, Ahmad H.

    Published 2017
    “…A controller based on an algorithm of one time maximum power point (MPP) is proposed to mitigate those losses. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Effects of Authentication of Users in Mobile Internet Protocol Version 6 by Obenofunde, Simon Tabi

    Published 2004
    “…A password algorithm is proposed from which a program can be written in any language deemed suitable.…”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Video traffic analysis on Unifi broadband network / Laina Sofia Mahamad by Mahamad, Laina Sofia

    Published 2017
    “…Thirdly, to identify best traffic model based on fitted model in developing network traffic bandwidth control algorithms. …”
    Get full text
    Get full text
    Thesis
  12. 12

    IoT based IMU sensor network for human arm pose estimation / Jahangir Hassan Khan by Jahangir , Hassan Khan

    Published 2019
    “…The Forward Kinematics approach has great advantage such as being easy to program and its faster computational speed, as compared to the conventional arm pose estimation algorithms. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14