Search Results - (( based encryption path algorithm ) OR ( panel information ((bat algorithm) OR (_ algorithm)) ))
Search alternatives:
- panel information »
- path algorithm »
- bat algorithm »
-
1
Route optimization security in mobile IPv6 wireless networks: a test-bed experience
Published 2008“…This algorithm is able to detect and prevent the attacker from modifying the data with using an encryption algorithm by cost of little bit increase but tolerable delay. …”
Get full text
Get full text
Conference or Workshop Item -
2
Security enhancement of route optimization in mobile IPv6 networks
Published 2008“…This algorithm is able to detect and prevent the attacker from modifying the data with using an encryption algorithm by cost of little bit increase but tolerable delay. …”
Get full text
Get full text
Get full text
Article -
3
-
4
Optimisation of tilt angles for fixed PV Panel via computational algorithm
Published 2022“…Therefore, this Final Year Project (FYP) proposes and develops a computational algorithm to calculate the annual energy generation at different tilt angles of the PV panel and determine the optimum tilt angles of the PV panel at various locations in Malaysia under local weather conditions. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
5
-
6
Integration Of Machine Vision In Industrial Robot For Automated Composite Panel Punching
Published 2018“…The aim of this research is to build a machine vision algorithm for assisting KUKA robot in recognizing and calibrating various shapes of composite panels precisely. …”
Get full text
Get full text
Thesis -
7
-
8
-
9
Analysis of sepic DC/DC converter using perturb & observe algorithm for photovoltaic charge controller
Published 2015“…This simulation provides an information on how the P&O algorithm reacts to the changement of solar irradiation and how long it took for this MPPT to track the Maximum Power Point (MPP). …”
Get full text
Get full text
Thesis -
10
Image orientation watermarking technique for copyright protection
Published 2016“…In return, a copyright gains its validity based on such robust characteristics. Watermarking attracts much interest in algorithm design to enable a signature to be embedded on secrecy and encryption beds. …”
Get full text
Get full text
Get full text
Thesis -
11
A real-time integrated fire detection and alarm (FDA) system for network based building automation
Published 2017“…The framework shares information through the algorithm and communicates with each fire alarm panels connected in peer to peer configuration to declare the network state in every second using network address. …”
Get full text
Get full text
Get full text
Article -
12
-
13
-
14
Solar Photovoltaic Maximum Power Point Tracking via Predictive Technique
Published 2022“…The potential combination gained from P-V and I-V curves could be referred to develop the optimization system. Hence, from this information, the optimal output voltage, current and power can be delivered from the PV panel. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
15
The prevalence of germinal centre B-cell and nongerminal centre B-cell subtypes of diffuse large B-cell lymphomas (hans algorithm) in Hospital Sultanah Bahiyah: a comparison with m...
Published 2020“…It can be classified into two prognostic subgroups, germinal centre B-cell (GCB) and non-GCB (NGCB) subtypes using an immunohistochemistry (IHC) panel comprising of CD10, BCL6, and MUM1 according to Hans Algorithm (HA) while Muris algorithm (MA) incorporate BCL2 as a prognostic marker. …”
Get full text
Get full text
Thesis -
16
Modelling Autonomous Evacuation Navigation System (AENS) for optimal route using Dijkstra's algorithm
Published 2016“…Through ST adaptation, all subsystems were integrated and using the “Dijkstra’s algorithm” (DA) by modifying its function from shortest path algorithm to safest and shortest algorithm, to the nearest exit. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
17
Network-based real-time integrated Fire Detection and Alarm (FDA) system with building automation
Published 2017“…The framework shares information and communicates with each fire alarm panels connected in peer to peer configuration and declare the network state using network address declaration from any building connected in network. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
18
PV module maximum power point tracker (MPPT) using microcontroller
Published 2008“…Many such algorithms have been proposed. However, one particular algorithm, the perturb-and-observe (P&O) method, claimed by many in the literature to be inferior to others, continues to be by far the most widely used method in commercial PV MPPT’s.…”
Get full text
Get full text
Undergraduates Project Papers -
19
Peripheral Interface Controller (PIC) Based Maximum Power Point Tracking (MPPT) Algorithm For Photovoltaic (PV) DC To DC Boost Converter
Published 2016“…Many such algorithms have been proposed. However, one particular algorithm, the constant voltage method, claimed by many in the literature to be inferior to others, continues to be by far the most widely used method in commercial PV MPPT’s. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
20
Credential hardening by using touchstroke dynamics
Published 2014“…We capitalize on the high resolution timing latency and the pressure information on touch screen panel as feature data. Following this a light weight algorithm is introduced to calculate the similarity between feature vectors. …”
Get full text
Get full text
Article
