28 were found based on your criteria

  • Fixed-Price – Est. Budget: $30.00 Posted
    Develop models of engineering systems in the field of electrical and mechanical engineering 2 Use current software simulation tools 3 Have knowledge about fuzzy mathematics and many-valued logic 4 Design and implement fuzzy systems
  • Fixed-Price – Est. Budget: $300.00 Posted
    Project Outcome: Objective- The objective of this project is to compare performance of P,PI,PID,FUZZY,FUZZY PI,FUZZY PD,FUZZY PID controllers to find the best (efficient and effective) controller. Also compare settling time, rising time, maximum Overshoot, Steady State error etc of all the controllers. Steps:- 1. Understand given Motor specifications 2. Mathematical Modelling of motor with above specifications 3. Finding Transfer Function of above motor (Relating T.F. with Mathematical Model of DC Motor) along with ...
  • Fixed-Price – Est. Budget: $10.00 Posted
    hi, i am having several jpg files which contains similar text as in the attachment. i require a matlab program for converting the text from jpg files to txt files.
  • Fixed-Price – Est. Budget: $100.00 Posted
    I need a program which detect half visible faces in the crowd.(Half visible can be face right half visible or left half visible) plz apply if you can do this work . Matlab is preferred but other tools also acceptable. thanks
  • Fixed-Price – Est. Budget: $100.00 Posted
    This program deals with singular values and image compression. Using Matlab to do with numerical analysis Guidelines: This program deals with singular values and image compression. Also, this is some professor's comment Just some thoughts on how to improve your final programs: - Use more sig figs! So if your error is supposed to be 1e-6, us at least 6 decimal places in your answers. - Do all runs that the program prompt asks for. - For your analysis, give me some ...
  • Fixed-Price – Est. Budget: $70.00 Posted
    I need MATLAB Implementation for improving the security in Mobile Ad Hoc Networks (MANET). You are required to simulate different attacks in MANETs using any new technique. Finally, the graph should be generated for comparison between existing and proposed algorithmic approach. IMMEDIATE START REQUIRED