Search Results - (( variable implementation using algorithm ) OR ( java location based algorithm ))
Search alternatives:
- variable implementation »
- implementation using »
- using algorithm »
- java »
-
1
Fuzzy-based multi-agent approach for reliability assessment and improvement of power system protection
Published 2015“…The simulation results for the first and second models are done using the data obtained from Malaysia distribution network (DISCO-Net) and 69 bus test system that were implemented using Java Agent Development Framework package software. …”
Get full text
Get full text
Thesis -
2
-
3
Group formation using genetic algorithm
Published 2009“…However, due to lack of programming skills especially in Java programming language and the inability to have meetings frequently among the group members,most of the students’ software project cannot be delivered successfully.To solve this problem, systematic group formation is one of the initial factors that should be considered to ensure that every group consists of quality individuals who are good in Java programming and also to ensure that every group member in a group are staying closer to each other.In this research, we propose a method for group formation using Genetic Algorithms, where the members for each group will be generated based on the students’ programming skill and location of residential colleges.…”
Get full text
Get full text
Get full text
Get full text
Monograph -
4
Multi-floor indoor location estimation system based on wireless local area network
Published 2007“…The most probable match is selected and returned as estimated location based on Bayesian filtering algorithm. Estimated location is reported as physical location and symbolic location. …”
Get full text
Get full text
Thesis -
5
-
6
FPGA implementation of variable precision Euclid’s GCD algorithm
Published 2017“…Methodology: In this paper, we implement a fast GCD coprocessor based on Euclid's method with variable precisions (32-bit to 1024-bit). …”
Get full text
Get full text
Get full text
Article -
7
Variable block based motion estimation using hexagon diamond full search algorithm (HDFSA) via block subtraction technique
Published 2015“…The fixed block matching uses the same block size throughout the motion estimation process while the variable block matching uses different block size. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
Automatic control of flotation process using computer vision
Published 2015“…In addition, several algorithms were implemented to measure the other important image variables such as froth velocity,froth color and bubble collapse rate. …”
Get full text
Get full text
Thesis -
9
Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform
Published 2009“…The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Variable Global Optimization min-sum (VGOMS) algorithm of decode-and forward-protocol for the relay node in the cooperative channel
Published 2020“…A low complexity min-sum (MS) based algorithm called the Variable Global Optimization min-sum (VGOMS) algorithm has been developed to minimise the error corrective performance. …”
Get full text
Get full text
Get full text
Article -
11
Development of fault detection, diagnosis and control system identification using multivariate statistical process control (MSPC)
Published 2006“…In this research work, an FDD algorithm is developed using MSPC and correlation coefficients between process variables. …”
Get full text
Get full text
Monograph -
12
Variable Global Optimization min-sum (VGOMS) algorithm of decodeand-forward protocol for the relay node in the cooperative channel
Published 2019“…A low complexity min-sum (MS) based algorithm called the Variable Global Optimization min-sum (VGOMS) algorithm has been developed to minimise the error corrective performance. …”
Get full text
Get full text
Get full text
Article -
13
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…Subsequently, this project embedded with a lightweight Geo-Encryption algorithm to preserve the privacy of real-time GPS location. …”
Get full text
Get full text
Get full text
Academic Exercise -
14
A DC motor controller using PID algorithm implementation on PIC
Published 2008“…This project is about controlling the speed of DC servo motor by using Proportional-Integral-Derivative (PID) algorithm then implemented on Peripheral Interface Circuit (PIC) microcontroller. …”
Get full text
Get full text
Undergraduates Project Papers -
15
Accelerating DNA sequence alignment based on smith waterman algorithm using recursive variable expansion / Muhamad Faiz Ismail
Published 2014“…Finally, we validate the proposed DP framework using the Smith-Waterman (SW) algorithm, which is a widely used, computation and data intensive application in bioinformatics. …”
Get full text
Get full text
Thesis -
16
Temperature control using PID gain scheduling method for glycerin bleaching process: article / Riduan Suluhi
“…The aim of the study is to design and implement the temperature control using gain scheduling method for glycerin bleaching process. …”
Get full text
Get full text
Article -
17
Design optimization of valve timing at various engine speeds using Multi-Objective Genetic Algorithm (MOGA)
Published 2008“…The primary concern is to acquire the clear picture of the implementation of Multi-Objective Genetic Algorithm and the essential of variable valve timing effects on the engine performances in various engine speeds. …”
Get full text
Get full text
Proceeding Paper -
18
Numerical algorithm of block method for general second order ODEs using variable step size
Published 2017“…Consequently, a direct block multistep method with utilization of variable step size strategy is proposed. This method was developed for computing the solution at four points simultaneously and the derivation based on numerical integration as well as using interpolation approach. …”
Get full text
Get full text
Get full text
Article -
19
Security analysis of blowfish algorithm
Published 2013“…C++ is used in the implementation of the blowfish algorithm; MATLAB programming (Mathworks, R., 2012a) is used in the implementation of avalanche effect and correlation coefficient.…”
Get full text
Get full text
Conference or Workshop Item -
20
Hardware Implementation Of Rc4a Stream Cipher Algorithm
Published 2007“…The implementation is able to support variable key lengths from 8 bits up to 512 bits. …”
Get full text
Get full text
Thesis
