Search Results - (( its application ((need algorithm) OR (_ algorithm)) ) OR ( based application need algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    Performance evaluation of PID controller optimisation for wheel mobile robot using Bat based optimisation algorithm by ,, Dwi Pebrianti, Ann Ayop azmi, Nurnajmi Qasrina, Bayuaji, Luhur, Suarin, Nur Aisyah Syafinaz, ,, Muhammad Syafrullah

    Published 2022
    “…PID is considered as simple yet powerful controller for many kinds of applications. In designing PID, user needs to set appropriate controller gain to achieve a desired performance of the control system, in terms of time response and its steady state error. …”
    Get full text
    Get full text
    Book Chapter
  4. 4

    CONTEXT AWARE TRAFFIC SCHEDULING ALGORITHM FOR COMMUNICATION SYSTEM IN POWER DISTRIBUTION NETWORK by NURSHAZLINA SUHAIMY

    Published 2023
    “…This enables smart grid to communicate with each of its devices and applications in monitoring and controlling the components remotely. …”
    text::Thesis
  5. 5
  6. 6

    Modifying iEclat algorithm for infrequent patterns mining by Julaily Aida, J., Mustafa, M.

    Published 2018
    “…A few parts of this algorithm need a modification to assure that it is suitable for mining infrequent pattern. …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12

    Solar photovoltaic system based on perturb and observe maximum power point tracking with trapezoidal rule approach under partial shading conditions by Altwallbah, Neda Mahmod Mohammad.

    Published 2022
    “…Among all proposed algorithms, perturb and observe (P&O) algorithm is the most popular due to its simplicity and good convergence. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Modified Data Encryption Standard Algorithm for Textbased Applications by Mohamed Khmag, Asem Ib.

    Published 2006
    “…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
    Get full text
    Get full text
    Thesis
  14. 14

    Neighbour-based on-demand routing algorithms for mobile ad hoc networks by Ejmaa, Ali Mohamed E.

    Published 2017
    “…Accordingly, a Novel Density-Aware Routing algorithm (NDAR) is proposed. The proposed algorithm totally eliminates the need for fixed threshold values through the use of a novel formula that can easily estimate the node density and replace the fixed threshold value based on the neighbor information. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Railway shortest path planner application using ant colony optimization algorithm / Muhammad Hassan Firdaus Ruslan by Ruslan, Muhammad Hassan Firdaus

    Published 2017
    “…For the process module, Ant Colony Optimization (ACO) algorithm was used to find the shortest path. Using ACO, a Railway Shortest Path Planner (RSPP) application will be developed to help user determine their shortest path from one station to another. …”
    Get full text
    Get full text
    Thesis
  16. 16

    New approach of cryptography algorithm for e- mail applications by Khmag, Asem, Babiker, Elsadig, Ramli, Abd Rahman

    Published 2005
    “…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17
  18. 18
  19. 19

    Home buyer assistant using artificial bee colony algorithm / Muhammad Izzat Azri Azman by Azman, Muhammad Izzat Azri

    Published 2017
    “…After that, in exploitation process, the algorithms will exploit the generated population to search for a desired home according to the preferences and its priority. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Design and Implementation of Intelligent Interoperability Framework for Heterogeneous Subsystems in Smart Home Environment by Perumal, Thinagaran

    Published 2011
    “…Besides, this algorithm provides home users or application developers to implement their own event operators with bespoke syntax for their application purpose by defining cross-events corresponding to the event operators. …”
    Get full text
    Get full text
    Thesis