Search Results - (( its application acs algorithm ) OR ( some applications ((a algorithm) OR (new algorithm)) ))*
Search alternatives:
- some applications »
- its application »
- application acs »
- acs algorithm »
- new algorithm »
- a algorithm »
-
1
-
2
DC-based PV-powered home energy system
Published 2017“…A controller based on an algorithm of one time maximum power point (MPP) is proposed to mitigate those losses. …”
Get full text
Get full text
Thesis -
3
Optimization of Motion Compensated Block-Based DCT Video Compression for Software Implementation
Published 2000“…For the implementation aspect, software-driven media processing was studied. A popular software-driven media processing's technology - MMXTM was studied for its application in 2-D 8x8 DCI. …”
Get full text
Get full text
Thesis -
4
-
5
-
6
-
7
-
8
Corrosion Inhibition Study Of Carboxymethyl Celluloseionic Liquid Via Electrochemical And Machine Learning Technique
Published 2024journal::journal article -
9
Adaptive Traffic Prioritization Algorithm Over Ad Hoc Network Using IEEE 802.11e
Published 2016“…This thesis proposes an adaptive traffic prioritization algorithm over ad hoc network using IEEE 802.11e standard that defines a set of Quality of Service enhancements for wireless LAN applications through modifications to the Media Access Control (MAC) layer. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
-
11
An Efficient Computational Algorithm for Solving Arbitrary Sylvester Matrix Equations in Fuzzy Control Theory (S/O 14179)
Published 2021“…With that, the constructed algorithm is considered as a new contribution to the application of control system theory…”
Get full text
Get full text
Monograph -
12
HISEC: a new lightweight block cipher algorithm
Published 2014“…In this paper, we propose a new lightweight block cipher algorithm called HISEC. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
13
Achieving security by combining Huffman and SLSB algorithms
Published 2013Get full text
Get full text
Get full text
Article -
14
Cryptography: A New Approach of Classical Hill Cipher
Published 2013Get full text
Get full text
Article -
15
Performance comparison of classification algorithms for EEG-based remote epileptic seizure detection in wireless sensor networks
Published 2014“…Identification of epileptic seizure remotely by analyzing the electroencephalography (EEG) signal is very important for scalable sensor-based health systems.Classification is the most important technique for wide-ranging applications to categorize the items according to its features with respect to predefined set of classes.In this paper, we conduct a performance evaluation based on the noiseless and noisy EEG-based epileptic seizure data using various classification algorithms including BayesNet, DecisionTable, IBK, J48/C4.5, and VFI.The reconstructed and noisy EEG data are decomposed with discrete cosine transform into several sub-bands.In addition, some of statistical features are extracted from the wavelet coefficients to represent the whole EEG data inputs into the classifiers.Benchmark on widely used dataset is utilized for automatic epileptic seizure detection including both normal and epileptic EEG datasets.The classification accuracy results confirm that the selected classifiers have greater potentiality to identify the noisy epileptic disorders.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
-
17
Adaptive beamforming algorithm based on Simulated Kalman Filter
Published 2017“…Some of the metaheuristic algorithms have been modified from the original algorithms to improve the algorithms performance in adaptive beamforming application. …”
Get full text
Get full text
Thesis -
18
-
19
DESIGN AND EVALUATION OF RESOURCE ALLOCATION AND JOB SCHEDULING ALGORITHMS ON COMPUTATIONAL GRIDS
Published 2012“…Thus, overall aim of this research is to introduce new grid scheduling algorithms for resource allocation as well as for job scheduling for enabling a highly efficient and effective utilization of the resources in executing various applications. …”
Get full text
Get full text
Thesis -
20
A new stepsize for gradient method via weak secant equation
Published 2007Get full text
Conference or Workshop Item
