Search Results - (( data construction force algorithm ) OR ( java implication based algorithm ))

Refine Results
  1. 1

    Software User Interface and Algorithm Development for Signal and Noise Characterization by Phoong, Wei Siang

    Published 2015
    “…Atomic force microscopy (AFM) also known as “Scanning force microscopy (SFM)” is high resolution scanning probe. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  2. 2
  3. 3

    Measurement system to study the relationship between forearm EMG signals and hand grip force by Sidek, Shahrul Naim, Haja Mohideen, Ahmad Jazlan

    Published 2012
    “…Hand grip force, wrist flexion and wrist extension are the result of forearm muscle activity. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  4. 4

    ECG encryption enhancement with multi-layers of AES and DNA computing by Kh-Madhloom, Jamal

    Published 2023
    “…MATLAB 2017b, a reliable simulation method, was utilised throughout the construction and validation of the algorithm. The performance of the recommended approach makes it possible to thwart an attack using brute force considerably more fast than is possible with the encryption technologies that are currently in use. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6
  7. 7
  8. 8

    Key schedule algorithm based on coordinate geometry of a three-dimensional hybrid cube by Mushtaq, Muhammad Faheem

    Published 2019
    “…Cryptographic algorithms play an important role in information security where it ensures the security of data across the network or storage. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Key generation technique based on triangular coordinate extraction for hybrid cubes by Mushtaq, Muhammad Faheem, Jamel, Sapiee, Mohamad, Kamaruddin Malik, Ahmad Khalid, Shamsul Kamal, Mat Deris, Mustafa

    Published 2017
    “…Cryptographic algorithms play an important role in information security where it ensures the security of data across the network or storage. …”
    Get full text
    Get full text
    Article
  10. 10

    Parametric system identification and active vibration control of vibrational structures using genetic algorithm by Mohammad Sofi @ Aziz, Azfi Zaihan

    Published 2007
    “…The sets of data obtained were utilised to develop ARX model using Least Squares (LS), Recursive Least Squares (RLS) and Genetic Algorithm (GA) methods. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Optimal network reconfiguration and intelligent service restoration prediction technique based on Cuckoo search spring algorithm / Mohamad Izwan Zainal by Zainal, Mohamad Izwan

    Published 2022
    “…In this research, Cuckoo Search Spring Algorithm (CSSA) is proposed to enhance the robustness of algorithm by constructing the optimal network reconfiguration consist of reducing power losses and improve voltage profile with the various loadability factor as the constraint according to load profile, based on single and multiobjective model. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    Computational methods for self-assembly of DNA nanostructures / Ong Hui San by Ong, Hui San

    Published 2016
    “…Compared to conventional machine, natural hardware has data encoded as molecules and requires molecular biology tools to transform these data in order to perform computation. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Process feasibility study of energy integrated distillation columns sequence (EIDCS) for NGL separation process by Munawar Zaman Shahruddin, Muhammad Hanis Fikri Mohamad Uzuman, Rohani Mohd Zin, Tengku Amran Tengku Mohd, Mohd Kamaruddin Abd. Hamid, Renanto Handogo

    Published 2025
    “…The grid diagram of the heat exchanger network for the best sequence is then constructed. The results indicate that the driving force method provides a better sequence with lower energy requirements for distillation compared to the direct sequence. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Development of finite element model for soil-structure interaction by Shoaei, Mohammad Dalili

    Published 2014
    “…All the redistributions and alterations of structural forces contributed in changing the yielding mechanisms of the considered frames. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Fault Detection and Identification in Quadrotor System (Quadrotor Robot) by Chan, Shi Jing, Pebrianti, Dwi

    Published 2016
    “…The aim of the research is to construct and design a Fault Detection and Isolation algorithm. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18
  19. 19

    Optimization of hydropower reservoir system using genetic algorithm for various climatic scenarios by Tayebiyan, Aida

    Published 2015
    “…In order to increase the system efficiency and maximize the power generation, constructed operation models were optimized. To determine the optimum solution in each policy, real coded genetic algorithm is used as an optimization technique. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Multi agent quality of service routing based on scheme ant colony optimization algorithm by Baygi, Maassoumeh Javadi

    Published 2014
    “…The proposed scheme has been simulated by OMNET++ and compared with standard AntNet and two well-known standard QoS routings; Widest Shortest Path (WSP) algorithm and Shortest Widest Path (SWP) algorithm. …”
    Get full text
    Get full text
    Thesis