Search Results - (( ((based application) OR (its application)) a algorithm ) OR ( wave applications a algorithm ))

Refine Results
  1. 1

    Design and implementation of cordic algorithm with sinusoidal pulse width modulation switching strategy by Madzzaini, Nur Sofea Eleena

    Published 2017
    “…CORDIC is very popular for its potential of efficiency and low cost implementation of a large category of applications since it only requires shifter and adder. …”
    Get full text
    Get full text
    Student Project
  2. 2
  3. 3
  4. 4
  5. 5

    An algorithm for Elliott Waves pattern detection by Vantuch, T., Zelinka, I., Vasant, P.

    Published 2018
    “…They differ in amount of found EW patterns, quality and size. The following application of the developed detection algorithm was based on recognition of an incomplete EW patterns with aim of the prediction of the following progress of the time set. …”
    Get full text
    Get full text
    Article
  6. 6

    An algorithm for Elliott Waves pattern detection by Vantuch, T., Zelinka, I., Vasant, P.

    Published 2018
    “…They differ in amount of found EW patterns, quality and size. The following application of the developed detection algorithm was based on recognition of an incomplete EW patterns with aim of the prediction of the following progress of the time set. …”
    Get full text
    Get full text
    Article
  7. 7
  8. 8
  9. 9
  10. 10

    Enhanced control algorithms for multilevel inverter-based shunt active power filter by Hoon, Yap

    Published 2017
    “…Nowadays, harmonics mitigations and reactive power compensations are compulsory in power distribution systems due primarily to significant increment of current harmonics and reactive power burden resulted from widespread applications of power electronic devices. Among the existing mitigation solutions, multilevel inverter-based shunt active power filter (SAPF) is potentially to be effective against current harmonics and power factor (PF) degradation, and its mitigation performance is strictly dependent on the quality of its control algorithms. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12
  13. 13

    Cohesive token passing algorithm utilizing software agents by Abdulrazzak, A. Fua’ad, Subramaniam, Shamala

    Published 2010
    “…The communications domain has utilized the implementation of protocols for a wide spectrum of applications. This encompasses Medium Access Control (MAC) protocols. …”
    Get full text
    Get full text
    Article
  14. 14
  15. 15

    Energy-efficient power allocation for downlink non orthogonal multiple access networks based on game theory and genetic algorithm / Reem Mustafa Mah’d Al Debes by Reem Mustafa , Mah’d Al Debes

    Published 2025
    “…The proposed method achieves a 75% enhancement in energy efficiency compared to conventional Orthogonal Multiple Access (OMA) and an 11% improvement over benchmark NOMA algorithms. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Iterative And Single-Step Solutions Of Two Dimensional Time-Domain Inverse Scattering Problem Featuring Ultra Wide Band Sensors by Binajjaj, Saeed Ali Saeed

    Published 2010
    “…First, the algorithms‘ performances were evaluated using numerical simulation employing two different scanning geometries: limited and full view scanning geometries, where the applicability of these algorithms was accessed by comparing the reconstructed images with actual model. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19
  20. 20