Search Results - (( variable implementation during algorithm ) OR ( java application during algorithm ))
Search alternatives:
- variable implementation »
- implementation during »
- application during »
- during algorithm »
- java application »
-
1
SUDOKU HELPER
Published 2015“…In this paper research, author presents an algorithm to provide a tutorial for any Sudoku player who got stuck during the solving process. …”
Get full text
Get full text
Final Year Project -
2
Study of nature inspired computing (NIC) technique for optimal reactive power dispatch problems
Published 2017“…ORPD problem is a nonlinear optimization problem that involving both equality constraints and inequality constraints. The proposed algorithms are tested on five different case studies which are IEEE 30-bus system with 13 control variables, IEEE 30-bus system with 19 control variables, IEEE 30-bus system with 25 control variables, IEEE 57-bus system with 25 control variables and IEEE 118-bus system with 77 control variables. …”
Get full text
Get full text
Research Report -
3
Smoothed functional algorithm with norm-limited update vector for identification of continuous-time fractional-order Hammerstein Models
Published 2024“…In particular, the standard smoothed functional algorithm (SFA) based method is modified by implementing a limit function in the update vector of the standard SFA based method to solve the issue of high tendency of divergence during the identification process. …”
Get full text
Get full text
Get full text
Article -
4
A PI based coordinated maximum power point tracking controller for grid connected photovoltaic system / Md Haidar Islam
Published 2021“…The proposed algorithm enhances the steady-state and dynamic responses by introducing an improved adaptive step-size for updating variables. …”
Get full text
Get full text
Get full text
Thesis -
5
Monitoring and Control of Pressure in a Gas Plant via PID plus Feedforward Controller
Published 2009“…The controller is observed to see how well a variable can be manipulated and controlled in real-time implementation. …”
Get full text
Get full text
Final Year Project -
6
Application of Moth-Flame Optimizer and Ant Lion Optimizer to Solve Optimal Reactive Power Dispatch Problems
Published 2018“…These two algorithms are implemented in ORPD to determine the optimal value of generator buses voltage, transformers tap setting and reactive compensators sizing in order to minimize power loss in the transmission system. …”
Get full text
Article -
7
Effect of input variables selection on energy demand prediction based on intelligent hybrid neural networks
Published 2015“…The results show that hybrid forecast model provide better performance when it is trained and tested with optimally selected input variable vector (IV), containing historical load and meteorological variables. …”
Get full text
Get full text
Article -
8
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
9
Classification Of Cervical Cancer Stage From Pap Smear Tests
Published 2019“…During image preprocessing, the image will be converted to greyscale before improving their contrast level for better analysis. …”
Get full text
Get full text
Final Year Project -
10
Predicting crop yield and field energy output for oil palm using genetic algorithm and neural network models
Published 2019“…There was not enough information available on the implementation of neural networks and genetic algorithm for the prediction and selecting input variables in oil palm yield and output energy. …”
Get full text
Get full text
Thesis -
11
A single measurement of combined Direct and indirect MPPT algorithm for mismatch PV module application / Mohd Najib Mohd Hussain
Published 2016“…A novel of combination direct and indirect (CoDId) MPPT algorithm is implemented for solving mismatch losses from existing PV system by employing the implementation of system identification approach. …”
Get full text
Get full text
Thesis -
12
-
13
-
14
Optimized fuzzy logic sliding mode control with proportional-integral-derivative for an electrohydraulic actuator system
Published 2023“…The proposed control strategy was designed with the switching function modification based on an FL approach in the conventional SMC algorithm called FLSMC. A particle swarm optimization (PSO) algorithm was implemented as the FLSMC design involves a complicated procedure and mathematical formulations to obtain the optimal value of the designed control variables. …”
Get full text
Get full text
Get full text
Thesis -
15
Modelling and simulation of drying process for ceramic membrane fabrication
Published 2015“…This two-dimensional mathematical modelling approach is able to predict the changes of variables in heat and mass transfer during the drying process. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
16
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
17
Cost reduction in bottom-up hierarchical-based VLSI floorplanning designs
Published 2015“…Besides, CABF shows its potential to be implemented in VLSI physical design as the runtime of CABF is faster with a near-optimal outcome as compared to the other existing algorithms. …”
Get full text
Get full text
Article -
18
Adaptive hybrid fuzzy-proportional plus crisp-integral current control algorithm for shunt active power filter operation
Published 2016“…Furthermore, the implementation of the proposed CCA has resulted more stable dc-link voltage waveform.…”
Get full text
Get full text
Article -
19
Haar cascade algorithm for microsleep detection
Published 2025“…Based on these results, future research should focus on enhancing the core algorithm to be more resilient to variable lighting and distance, thereby reducing false positives and negatives. …”
Get full text
Get full text
Article -
20
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
Published 2015“…This research work was limited to Java based web applications. In future research, the method can be extended to include other programming languages as well as other similar web application security vulnerabilities.…”
Get full text
Get full text
Thesis
