Search Results - (( data application force algorithm ) OR ( java implications based algorithm ))
Search alternatives:
- implications based »
- application force »
- java implications »
- data application »
- force algorithm »
-
1
-
2
Software User Interface and Algorithm Development for Signal and Noise Characterization
Published 2015“…Atomic force microscopy (AFM) also known as “Scanning force microscopy (SFM)” is high resolution scanning probe. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
3
Automated Negative Lightning Return Strokes Characterization Using Brute-Force Search Algorithm
Published 2024Get full text
journal::journal article -
4
HAPTIC VISUALIZATION USING VISUAL TEXTURE INFORMATION
Published 2011Get full text
Get full text
Thesis -
5
-
6
-
7
-
8
Features selection for IDS in encrypted traffic using genetic algorithm
Published 2013Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Measurement system to study the relationship between forearm EMG signals and hand grip force
Published 2012“…In certain applications such as controlling the movements of a robotic prosthetic hand, information relating wrist joint angles to forearm muscle activity is useful to be used as part of the control algorithm. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
10
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
11
SENSORY EXPERT: DEVICE FOR SENSORY TEST
Published 2018“…In developing the algorithm for heat sensing, humidity and temperature sensor DHT 11 is used and the data of temperature is displayed in Blynk applications. …”
Get full text
Get full text
Final Year Project -
12
-
13
Document clustering for knowledge discovery using nature-inspired algorithm
Published 2014Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Features selection for ids in encrypted traffic using genetic algorithm
Published 2013Get full text
Get full text
Get full text
Conference or Workshop Item -
15
-
16
Fraud detection in telecommunication using pattern recognition method / Mohd Izhan Mohd Yusoff
Published 2014“…The new algorithm is tested on simulated and real data where the results show it is capable of detecting fraud activities. …”
Get full text
Get full text
Get full text
Thesis -
17
-
18
Evaluation of automated phonetic labeling and segmentation for dyslexic children’s speech
Published 2013Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Dynamic force-directed graph with weighted nodes for scholar network visualization
Published 2022“…The approach is realized by creating a web-based interface using D3 JavaScript algorithm that allows the visualization to focus on how data are connected to each other more accurately than the conventional lines of data seen in traditional data representation. …”
Get full text
Get full text
Article -
20
