Search Results - (( using simulation table algorithm ) OR ( java location based algorithm ))
Search alternatives:
- simulation table »
- table algorithm »
- java »
-
1
Performance of Ad-Hoc on-Demand Distance Vector Discovery Algorithms Based On Packet Lifetime
Published 2008“…The performance analysis of the proposed algorithms was conducted by using the discrete-event simulator, OMNeT++. …”
Get full text
Get full text
Thesis -
2
-
3
Design and implementation of cordic algorithm with sinusoidal pulse width modulation switching strategy
Published 2017“…This design presents the uses of sinusoidal pulse width modulation (SPWM) as a switching control for multilevel inverter by using CORDIC algorithm. …”
Get full text
Get full text
Student Project -
4
Group formation using genetic algorithm
Published 2009“…However, due to lack of programming skills especially in Java programming language and the inability to have meetings frequently among the group members,most of the students’ software project cannot be delivered successfully.To solve this problem, systematic group formation is one of the initial factors that should be considered to ensure that every group consists of quality individuals who are good in Java programming and also to ensure that every group member in a group are staying closer to each other.In this research, we propose a method for group formation using Genetic Algorithms, where the members for each group will be generated based on the students’ programming skill and location of residential colleges.…”
Get full text
Get full text
Get full text
Get full text
Monograph -
5
Multi-floor indoor location estimation system based on wireless local area network
Published 2007“…The most probable match is selected and returned as estimated location based on Bayesian filtering algorithm. Estimated location is reported as physical location and symbolic location. …”
Get full text
Get full text
Thesis -
6
Power Delivery Network Modeling And Simulation By Using Delaunay-Voronoi Triangulation And The Latency Insertion Method
Published 2018“…The research is focused into the analysis of PDN by modeling and simulation of the power plane. In the project, power plane is modeled using Delaunay-Voronoi algorithm and for simulation, a fast transient simulation algorithm which is latency insertion method (LIM) is applied. …”
Get full text
Get full text
Monograph -
7
Design of nonlinear adaptive interaction algorithm controller for improvement of tracking performance of X-Y table ball screw drive system
Published 2023“…Secondly is to design a new control strategy that will provide good tracking performance of the XY table. The final objective is to validate the proposed technique through simulation using MATLAB/Simulink software and experimental work using real plant of Googoltech XY table. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
-
9
Simulation of identifying shortest path walkway in library by using ant colony optimization
Published 2012Get full text
Get full text
Undergraduates Project Papers -
10
Integrated geophysical, hydrogeochemical and artificial intelligence techniques for groundwater study in the Langat Basin, Malaysia / Mahmoud Khaki
Published 2014“…Water table modelling based on ANNs and ANFIS technology were developed to simulate the water table fluctuations based on the relationship between the variations of rainfall, humidity, evaporation, minimum and maximum temperature and water table depth. …”
Get full text
Get full text
Thesis -
11
A multiobjective simulated Kalman filter optimization algorithm
Published 2018“…It is a further enhancement of a single-objective Simulated Kalman Filter (SKF) optimization algorithm. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
OPTIMIZATION OFADVANCEDENCRYPTION STANDARD (AES) IN FPGA IMPLEMENTATION USING S-BOX INTEGRATION
Published 2004“…Thus, in this project, the AES cryptograph was simulated with FPGA, by using Verilog HDL. The main objectives are the architectural and algorithmic optimizations of the AES implementation, which would in turn benefit applications that are both speed and area critical. …”
Get full text
Get full text
Final Year Project -
13
Resource management in grid computing using enhanced ant colony optimization
Published 2010“…Simulation approach has been used to test the performance of the algorithm. …”
Get full text
Get full text
Conference or Workshop Item -
14
Load balancing using enhanced ant algorithm in grid computing
Published 2010Get full text
Get full text
Get full text
Conference or Workshop Item -
15
An adaptive relay selection scheme for enhancing network stability in VANETs
Published 2020“…Moreover, the network scalability is enhanced by adaptively selecting most sustainable paths based on a signal strength beacon and the mobility degree of a node, which reduces significantly minimizes the size of control messages overhead as well the routing tables recalculation process. Simulation experiments using the network simulator are presented to demonstrate the effectiveness of our solution. …”
Get full text
Get full text
Get full text
Article -
16
Ant colony algorithm for job scheduling in grid computing
Published 2010Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform
Published 2009“…The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
Dynamic obstacle handling in multi-robot coverage
Published 2024“…It then generates a new avoidance velocity for robots, enabling them to avoid dynamic obstacles while achieving complete coverage. The simulations were conducted by using MATLAB to demonstrate the superiority of Modified Lloyd’s algorithm with VO over existing Lloyd’s algorithm in terms of average of total number of collisions between robots and dynamic obstacle during coverage task. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
19
Analysis of avalanche effect on advance encryption standard by using dynamic S-Box depends on rounds keys
Published 2014“…Substitution table or S-Box is the major core of AES algorithm and it is used to provide confusion capability for AES. …”
Get full text
Get full text
Conference or Workshop Item -
20
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…Subsequently, this project embedded with a lightweight Geo-Encryption algorithm to preserve the privacy of real-time GPS location. …”
Get full text
Get full text
Get full text
Academic Exercise
