Search Results - (( wave applications usage algorithm ) OR ( _ application out algorithm ))
Search alternatives:
- applications usage »
- wave applications »
- usage algorithm »
- application out »
- out algorithm »
-
1
Development of novel tunable dual-band negative index metamaterial using open stub-loaded stepped-impedance resonator
Published 2011“…Parameters retrieval algorithm, and full-wave simulation of prism-shaped structure were carried out to validate the negative refraction characteristics of metamaterial structure. …”
Get full text
Get full text
Get full text
Article -
2
Tunable dual-band metamaterial using open stub-loaded stepped-impedance resonator
Published 2011“…Parameter retrieval algorithm and full-wave simulation of prism-shaped structure were carried out to validate the negative refraction characteristics of metamaterial structure. …”
Get full text
Get full text
Conference or Workshop Item -
3
Design and implementation of cordic algorithm with sinusoidal pulse width modulation switching strategy
Published 2017“…In addition, CORDIC algorithm has a low usage of memory space compared to Look Up table (LUT) technique. …”
Get full text
Get full text
Student Project -
4
Random traveling wave pulse coupled oscillator (RTWPCO) algorithm of energy-efficient wireless sensor networks
Published 2018“…To avert this problem, this study proposes a new mechanism called random traveling wave pulse-coupled oscillator algorithm, which is a self-organizing technique for energy-efficient wireless sensor networks using the phase-locking traveling wave pulse-coupled oscillator and random method on anti-phase of the pulse-coupled oscillator model. …”
Get full text
Get full text
Article -
5
Firefly-inspired time synchronization mechanism for self-organizing energy efficient wireless sensor networks
Published 2017“…The performances of the proposed algorithms were studied using a simulation analysis. …”
Get full text
Get full text
Get full text
Thesis -
6
Leak Detection in Medium Density Polyethylene (MDPE) Pipe Using Pressure Transient Method
Published 2015Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Circular synthetic aperture radar systems for on-the-ground object detection
Published 2012“…Moreover, their usage is limited to free-space applications due to their inability in penetrating into solid materials. …”
Get full text
Get full text
Thesis -
8
Remotely sensed imagery data application in mangrove forest: a review
Published 2018“…This paper attempts to review and discuss the usage of remotely sensed imagery data in mangrove forest management, and how they will improve the accuracy and precision in measuring the mangrove forest ecosystem. …”
Get full text
Get full text
Get full text
Article -
9
Voting algorithms for large scale fault-tolerant systems
Published 2011“…To do so, we have introduced a new sequential m-out-of-n algorithm with prediction ability which is known as enhanced m-out-of-n voter. …”
Get full text
Get full text
Thesis -
10
-
11
A web-based implementation of k-means algorithms
Published 2022“…The project was planned using the Kanban development methodology, and was built using HTML, CSS, JavaScript, Django, NumPy and pandas. The completed web application is then hosted on Heroku. k-luster allows users to upload their own data set, or choose from one of three samples if they just want to try out the application. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
12
Optimal power flow using the Jaya algorithm
Published 2016“…Statistical analysis is also carried out to check the reliability of the Jaya algorithm. …”
Get full text
Get full text
Get full text
Article -
13
Development and applications of metaheuristic algorithms in engineering design and structural optimization / Ali Sadollah
Published 2013“…In this thesis, the applications of a number of well-known metaheuristic algorithms for solving engineering problems have been considered. …”
Get full text
Get full text
Thesis -
14
Implication of image processing algorithm in remote sensing and GIS applications
Published 2011“…This paper generally analyzed and branch out algorithms to perceive their limitations and delimitation. …”
Get full text
Get full text
Get full text
Article -
15
-
16
Tracking The Eyes Using Interdependence Mean Shift Tracking Algorithm With Appropriate Information Provided
Published 2016“…The human eye tracking algorithm is very important, especially in the facial analysis application. …”
Get full text
Get full text
Get full text
Article -
17
An Improved of Channel Allocation for WLAN Using Vertex Merge Algorithm
Published 2012Get full text
Get full text
Conference or Workshop Item -
18
Noise reduction techniques in ECG signal
Published 2023Get full text
Get full text
Get full text
Article -
19
-
20
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…However, the increased security breaches of recent mental health applications that leaked the patient's profile. This project proposed a virtual mental health mobile application, called TalkOut, with a lightweight message encryption algorithm to protect patient's profile, conversation messages and treatment history. …”
Get full text
Get full text
Get full text
Academic Exercise
