Search Results - (( some application during algorithm ) OR ( its application system algorithm ))*
Search alternatives:
- application during »
- some application »
- during algorithm »
- system algorithm »
- its application »
-
1
-
2
Hybrid HCS-fuzzy mppt algorithm for hydrokinetic energy harnessing
Published 2022“…The fixed stepsize Hill Climbing Search (HCS) algorithm is widely used due to its simplicity. However, the operating point oscillates around the maximum power point (MPP) during dynamic steady-state resulting waste some amount of energy. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
-
4
Water level forecasting using feed forward neural networks optimized by African Buffalo Algorithm (ABO)
Published 2019“…These algorithms have succeeded with different accuracy levels, but it is still suffering from some weaknesses. …”
Get full text
Get full text
Thesis -
5
Elimination of raindrops effects in infrared sensitive camera
Published 2007Get full text
Get full text
Get full text
Thesis -
6
-
7
Optimal Long-Term Hydro Generation Scheduling of Small Hydropower Plant (SHP) using Metaheuristic Algorithm in Himreen Lake Dam
Published 2017Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Optimum Power Production of Small Hydropower Plant (SHP) Using Firefly Algorithm (FA) in Himreen Lake Dam (HLD), Eastern Iraq
Published 2017“…Thus, the addition of Kaplan turbine into Small Hydropower Plant (SHP) is verified to explore its applicability. This study focuses on the improvement of optimization model by applying particle swarm optimization and firefly algorithm methods in order to get a stable power production utility at its maximum level. …”
Get full text
Get full text
Get full text
Article -
9
Efficient prime-based method for interactive mining of frequent patterns.
Published 2011“…This is because the appropriate value depends on the type of application and expectation of the user. Moreover, in some real-time applications such as web mining and e-business, finding new correlations between patterns by changing the minimum support threshold is needed. …”
Get full text
Get full text
Article -
10
-
11
-
12
-
13
An enhanced mobile internet protocol version 6 (IPv6) with multicast function and hierarchical design.
Published 2006“…Mobile IPv6 mechanism requires some handover algorithm when it changes its point of attachment in the Internet.An enhanced micro mobility handover algorithm is developed on top of mobile IPv6. …”
Get full text
Patent -
14
Seamless horizontal handover algorithm for homogeneous wireless mobile networks using fuzzy logic
Published 2013“…The most important and society application of WiMAX is the mobile communication. When a mobile station changes its geographical position, it may also need to change its attachment point in the network in order to retain the quality of the connection. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
15
Prediction and multi-criteria-based schemes for seamless handover mechanism in mobile WiMAX networks
Published 2013“…This enables it to meet the MS application requirements based on some criteria such as CINR, BW, and delay. …”
Get full text
Get full text
Thesis -
16
Vehicle routing problem: models and solutions
Published 2008Get full text
Get full text
Get full text
Article -
17
Performance Comparison Between Pid And Lqr Controllers For Drone Application
Published 2021“…The PID algorithm becomes a closed loop system when it is added to the motor. …”
Get full text
Get full text
Monograph -
18
Image Segmentation using Enhanced K-means Clustering with Hybrid Image Filtering for Acute Leukemia Blood Cells Microscopic Images
Published 2024thesis::master thesis -
19
Monitoring and assessment of weld penetration condition during pulse mode laser welding using air-borne acoustic signal
Published 2021“…To develop the signal processing algorithm, multi-lag phase space (MLPS) method was adopted in which some modifications on its original algorithm were made by introducing the localized crest factor (CF) thresholding method to reduce the influence of noise. …”
Get full text
Get full text
Thesis -
20
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…Some applications, such as Message Authentication Code (MAC), rely on different hashing operations. …”
Get full text
Get full text
Get full text
Article
