Search Results - (( program implementation connection algorithm ) OR ( based constructive method algorithm ))
Search alternatives:
- implementation connection »
- program implementation »
- connection algorithm »
- based constructive »
- method algorithm »
-
1
A single measurement of combined Direct and indirect MPPT algorithm for mismatch PV module application / Mohd Najib Mohd Hussain
Published 2016“…A novel of combination direct and indirect (CoDId) MPPT algorithm is implemented for solving mismatch losses from existing PV system by employing the implementation of system identification approach. …”
Get full text
Get full text
Thesis -
2
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…The offline scheme utilizes a Time-based One-Time Password (TOTP) algorithm to allow users to authenticate to the vehicle without needing an Internet connection once they have registered online when Internet access is available. …”
Get full text
Get full text
Thesis -
3
Deterministic static sensor node placement in wireless sensor network based on territorial predator scent marking behavior
Published 2023“…The main objectives considered in this paper are to achieve maximum coverage and minimum energy consumption with guaranteed connectivity. A simulation study has been carried out to compare the performance of the proposed algorithm implemented in two different single objective approaches with an Integer Linear Programming based algorithm and another biological inspired algorithm. …”
Article -
4
Control algorithm for two-tank system using multiparametric programming
Published 2023“…In conclusion, the implementation of multiparametric programming is able to estimate the value of the output for the control algorithm of the two-tank system.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
An Enhanced Simulated Annealing Routing Algorithm for Semi-Diagonal Torus Network
Published 2017“…In order to achieve this objective, each node must be connected in its shortest way as possible. We start our algorithm by designing shortest path algorithm based on Dijkstra's method. …”
Get full text
Get full text
Get full text
Article -
6
Security mechanism for wireless Mobile Ad Hoc Networks (MANET)
Published 2006“…This report provides an overview of wireless ad hoc networks, wireless threats, cryptography background and the security algorithms for this encryption method. The One Time Pad algorithm and Caesar Cipher algorithms are implemented using LabVIEW software. …”
Get full text
Get full text
Student Project -
7
An evolutionary based features construction methods for data summarization approach
Published 2015“…In this work, we empirically compare the predictive accuracies of classification tasks based on the proposed feature construction methods and also the existing feature construction methods. …”
Get full text
Get full text
Research Report -
8
-
9
Parameter estimation of multivariable system using Fuzzy State Space Algorithm / Razidah Ismail … [et al.]
Published 2011“…In order to enhance the implementation of the algorithm, it is necesssary to develop an efficient computation program together with the user's interface. …”
Get full text
Get full text
Research Reports -
10
Ant system-based feature set partitioning algorithm for classifier ensemble construction
Published 2016“…In this study, Ant system-based feature set partitioning algorithm for classifier ensemble construction is proposed.The Ant System Algorithm is used to form an optimal feature set partition of the original training set which represents the number of classifiers.Experiments were carried out to construct several homogeneous classifier ensembles using nearest mean classifier, naive Bayes classifier, k-nearest neighbor and linear discriminant analysis as base classifier and majority voting technique as combiner. …”
Get full text
Get full text
Get full text
Article -
11
Design And Development Of Gas Argon Purging System
Published 2006“…AMPL is used in two ways of connection of its programming, first is Data Base, and second is PC element. …”
Get full text
Get full text
Monograph -
12
Knowledge base processing method based on text classification algorithm
Published 2023“…The text classification algorithm's knowledge base processing method utilizes existing data from the knowledge base to guide the construction and training of the classification model. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
Modular motor driver with torque control for gripping mechanism
Published 2023“…This is possible by taking in the magnitude of the current drawn by the load as the feedback to the system and set appropriate action to protect the system from damage when a certain setpoint of current is reached. In implementing the project, several algorithms were tested to achieve the torque control algorithm requirement including on-off algorithm, P algorithm, PI algorithm, PD algorithm and PID algorithm. …”
Conference paper -
14
Multi-base number representation in application to scalar multiplication and pairing computation
Published 2011“…Multi-bases number representation is used to construct new versions of Miller’s algorithm. …”
Get full text
Get full text
Thesis -
15
Moving detection using cellular neural network (CNN)
Published 2008“…The templates are programmed in MATLAB. There are few rules in Cellular Neural Network that has to be implemented when programming the templates, such as the state equation, output equation, boundary condition and also the initial value. …”
Get full text
Get full text
Undergraduates Project Papers -
16
-
17
Effects of Authentication of Users in Mobile Internet Protocol Version 6
Published 2004“…Comparisons are done between systems implementing authentication and those that do not. The results show that the average delay is not much affected by the implementation of the program. …”
Get full text
Get full text
Thesis -
18
-
19
Ant colony optimization based subset feature selection in speech processing: Constructing graphs with degree sequences
Published 2024journal::journal article -
20
Risk assessment for safety and health algorithm for building construction in Oman
Published 2015“…Instead, it is suggested that results be verified with an alternative method of assessing risk, such as RASH. In conclusion, RASH is an alternative and effective method for the assessment of safety and health risks in building construction in Oman.…”
Get full text
Get full text
Thesis
