Search Results - (( programming power detection algorithm ) OR ( java data function algorithm ))
Search alternatives:
- function algorithm »
- programming power »
- power detection »
- data function »
- java »
-
1
Fuzzy modeling using Bat Algorithm optimization for classification
Published 2018“…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
2
Reactive power imbalance method for islanding detection in micro-grid operation
Published 2014“…As the result, the performance of the Reactive Power Imbalance method for the islanding detection state is compared with the simulation model without control algorithm. …”
Get full text
Get full text
Get full text
Article -
3
-
4
WURFL detection engine using cosine string similarity algortlhm / Illiasaak Ahmad ... [et al.]
Published 2013Get full text
Get full text
Research Reports -
5
Implementation of Real-time Simple Edge Detection on FPGA
Published 2005“…The chosen image processing algorithms implemented was edge detection. This work utilizes Altera DE2 development board powered by Cyclone II FGPA pair with 1.3 Mega pixel CMOS camera from Terasic Technologies. …”
Get full text
Get full text
Conference or Workshop Item -
6
INTERFACING CMOS CAMERA WITH ARM MICROCONTROLLER FOR SMALL ROBOTIC PLATFORM
Published 2013“…The robot follows the object according to the algorithm that had been programmed. The heart of the system is Raspberry Pi. …”
Get full text
Get full text
Final Year Project -
7
Implementation of real-time simple edge detection on FPGA
Published 2007“…The chosen image processing algorithms implemented was edge detection. This work utilizes Altera DE2 development board powered by Cyclone II FGPA pair with 1.3 Mega pixel CMOS camera from Terasic Technologies. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
Biometric recognition system for UiTM Melaka Student’s Campus entrance / Khairul Rohaizzat Jamaluddin
Published 2017Get full text
Get full text
Student Project -
10
Design of a low-power microcontroller-based wireless ECG monitoring system
Published 2007“…A novel algorithm has been developed to detect life threatening events before transmission of signals to the nearby computer. …”
Get full text
Conference or Workshop Item -
11
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
12
Thermopile array sensor for children detection in automobile application
Published 2021“…The purpose of this report is to propose a dynamic background removal algorithm for human movement detection. Besides, this project aims to develop the proposed algorithm into image processing system. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
13
Power System State Estimation In Large-Scale Networks
Published 2010“…The results show that AR methods managed to accurately predict the data and filter the weigthage factors for the bad measurements. Also the WLS algorithm is modified to include Unified Power Flow Controller (UPFC) parameters. …”
Get full text
Get full text
Thesis -
14
Web-based RIG performance reporting system using interactive visualization techniques / Amir Hambaly Nasaruddin
Published 2019“…For the user to analyze the result, the system provides visual analytics technique which can educate the user on analyzing the result which is drill down and sorting function to educate users. The result of this project is all algorithm for visualizing data is functioning and the output produced from the system is correct and effective. …”
Get full text
Get full text
Thesis -
15
-
16
Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
Published 2009“…The system includes two main functions; first is the hiding of the information in unused area 2 of PE-file (.EXE file), through the execution of four process (specify the cover file, specify the information file, encryption of the information, and hiding the information) and the second function is the extraction of the hiding information through three process (specify the steno file, extract the information, and decryption of the information) and The proposed system is implemented by using java.…”
Get full text
Get full text
Get full text
Article -
17
Computational intellegence approach for overcurrent relay coordination
Published 2024text::Final Year Project -
18
Multiple and solid data background scheme for testing static single cell faults on SRAM memories
Published 2013“…Therefore, the purpose of this thesis is to introduce a Data Background (DB) scheme to generate an optimal March Test Algorithm (MTA) for detecting faults of memory that are undetectable using existing algorithms. …”
Get full text
Get full text
Thesis -
19
Optimize single line to ground fault detection in distribution grid power system using artificial bee colony
Published 2023“…This new method may improve distribution network SLGF detection. This first work can work online in electrical power stations by building the (eZdsp F28335-RS232) into the program to send fault signals to the control when SLGF occurs without damaging devices, equipment, cables, or power outages.…”
Get full text
Get full text
Get full text
Article -
20
Development of a prototype solar-powered autonomous vehicle prototype with object detection and avoidance system using Raspberry-Pi
Published 2024“…In this study, the development of a solar-powered autonomous vehicle prototype with an object detection and avoidance system was implemented and achieved using Raspberry Pi. …”
Get full text
Get full text
Get full text
Article
