Search Results - (( basic computer force algorithm ) OR ( java application during algorithm ))
Search alternatives:
- application during »
- java application »
- during algorithm »
- force algorithm »
- basic computer »
- computer force »
-
1
-
2
Optical tactile sensor for robotic assisted surface characterization / Amir Abd Latif
Published 2016“…The aim of this research is to develop a new automated technique for an optical tactile sensor in measuring normal and shear force for surface characterization. A new mathematical modelling and computer algorithm is developed and calibrated which are based on image processing methods. …”
Get full text
Get full text
Thesis -
3
A New Visual Public-Key Cryptosystem Based On Non-Expansion Technique And Boolean Operations
Published 2011“…However, most of the existing public-key algorithms are based on complex mathematical computations. …”
Get full text
Get full text
Thesis -
4
-
5
SUDOKU HELPER
Published 2015“…In this paper research, author presents an algorithm to provide a tutorial for any Sudoku player who got stuck during the solving process. …”
Get full text
Get full text
Final Year Project -
6
-
7
Computer remote monitoring via mobile phones using socket programming / Samih Omer Fadlelmola Elkhider
Published 2011“…The approach of the mobile cloud is clearly occurring with web host servers expands thus large number of data around the world stored in huge servers, consumers of mobile devices and small computing devices have high performance expectations usually, therefore mobile cloud computing theorizes that the cloud will soon become a disruptive force in the mobile world, eventually becoming the dominant way in which mobile applications operates. …”
Get full text
Get full text
Thesis -
8
-
9
POISSON EQUATION FOR ELECTROSTATIC FIELD USING THE FINITE DIFFERENCE METHOD
Published 2019Get full text
Get full text
Final Year Project Report / IMRAD -
10
-
11
-
12
-
13
Form Finding And Shape Change Analysis Of Spine Inspired Bio-Tensegrity Model
Published 2017“…The shape change of SBS models towards target state is achieved by means of forced elongation of cable. Computational strategies for the shape change consist of two stages: the derivation of incremental equilibrium equations and optimization of the cables forced elongation by sequential quadratic programming. …”
Get full text
Get full text
Thesis -
14
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
15
-
16
-
17
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
18
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
Published 2015“…This research work was limited to Java based web applications. In future research, the method can be extended to include other programming languages as well as other similar web application security vulnerabilities.…”
Get full text
Get full text
Thesis -
19
Design and Development of a Vision System Interface for Three Degree of Freedom Agricultural Robot
Published 1999“…An Interface program has been developed using Visual Basics to control and simulate 2D motion of the manipulator.…”
Get full text
Get full text
Thesis -
20
INVESTIGATION ON THE CUTTING PARTICLES TRANSPORT IN HORIZONTAL WELL DRILLING
Published 2010“…Due to high non- linearity, both were solved numerically after conversion to computer algorithms using MATLAB. The master model examined the performance of irregular shaped cuttings transported in concentric annulus by non-Newtonian fluids. …”
Get full text
Get full text
Thesis
