Search Results - (( its application system algorithm ) OR ( wave application ((acs algorithm) OR (_ algorithm)) ))*
Search alternatives:
- system algorithm »
- wave application »
- its application »
- acs algorithm »
-
1
-
2
Design and implementation of cordic algorithm with sinusoidal pulse width modulation switching strategy
Published 2017“…Usually, one sinusoidal wave is used for one inverter. In this design, SPWM is used for multilevel inverter application in photovoltaic (PV) system. …”
Get full text
Get full text
Student Project -
3
-
4
Deep Learning-Driven Mobility And Utility-Based Resource Management In Mm-Wave Enable Ultradense Heterogeneous Networks
Published 2025thesis::doctoral thesis -
5
Improvement of Auditory Brainstem Response (ABR) wave V amplitude using novel MLS nonlinear algorithm
Published 2011Get full text
Get full text
Get full text
Proceeding Paper -
6
Use of a non-linear algorithm to improve the maximum length sequence auditory brainstem response
Published 2012Get full text
Get full text
Proceeding Paper -
7
-
8
-
9
Use of a non-linear algorithm to improve the maximum length sequence auditory brainstem response
Published 2012Get full text
Get full text
Proceeding Paper -
10
Enhanced control algorithms for multilevel inverter-based shunt active power filter
Published 2017“…Lastly, a new current harmonics extraction algorithm known as simplified synchronous reference frame (SSRF) algorithm is developed, and with its simplified features, it is able to respond quickly to various system conditions while maintaining high accuracy. …”
Get full text
Get full text
Get full text
Thesis -
11
Evaluation of reference signal estimation techniques for the control of shunt active power filter
Published 2023Conference paper -
12
-
13
Energy-efficient power allocation for downlink non orthogonal multiple access networks based on game theory and genetic algorithm / Reem Mustafa Mah’d Al Debes
Published 2025“…Furthermore, the research explores advanced applications such as integrating NOMA with Millimeter-Wave technology and optimizing user association strategies, enhancing system capacity and overall performance. …”
Get full text
Get full text
Get full text
Thesis -
14
-
15
-
16
-
17
Secured mobile transaction using NFC Technology: Top-Up printing system
Published 2011“…As for the security measurement, MD5 algorithm is implemented to accept the system authorization. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
18
NFC secured online transaction in mobile computing business
Published 2012“…As for the security measurement, MD5 algorithm is implemented to process the system authorization. …”
Get full text
Get full text
Get full text
Article -
19
-
20
