Search Results - (( develop computer force algorithm ) OR ( java applications optimization algorithm ))

Refine Results
  1. 1
  2. 2

    Performance evaluation of real-time multiprocessor scheduling algorithms by Alhussian, H., Zakaria, N., Abdulkadir, S.J., Fageeri, S.O.

    Published 2016
    “…These results suggests that optimal algorithms may turn to be non-optimal when practically implemented, unlike USG which reveals far less scheduling overhead and hence could be practically implemented in real-world applications. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Route Optimization System by Zulkifli, Abdul Hayy

    Published 2005
    “…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
    Get full text
    Get full text
    Final Year Project
  4. 4
  5. 5
  6. 6

    A real-time algorithm of optical tactile sensor for surface characterization / Nurul Fathiah Mohamed Rosli by Mohamed Rosli, Nurul Fathiah

    Published 2016
    “…A surface exploration computer algorithm to obtain the sensing information was developed in order to analyse the characteristic of the optical tactile sensor. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11

    Virtual force field algorithm for a behaviour-based autonomous robot in unknown environments by Nakhaeinia, Danial, Tang, Sai Hong, Karasfi, Babak, Motlagh, Omid Reza Esmaeili, Kit, A. C.

    Published 2011
    “…The present paper describes a real-time motion-planning approach which lies in the integration of three techniques: fuzzy logic (FL), virtual force field (VFF), and boundary following (BF). The FL algorithm is used for velocity control based on sonar readings. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12
  13. 13

    Computer Lab Timetabling Using Genetic Algorithm Case Study - Unit ICT by Abdullah, Amran

    Published 2006
    “…Genetic Algorithm is one of the most popular optimization solutions used in various applications such as scheduling. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Real-time measurement and gait detection algorithm for motion control of active ankle foot orthosis / Aminuddin Hamid by Hamid, Aminuddin

    Published 2015
    “…The data acquired from force sensors during walking condition is transferred to the host computer powered by LabVIEW software for visualization and analysis. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Calibration of optical based silicone tactile sensor based on image deformation technique / Abdul Halim Esa by Esa, Abdul Halim

    Published 2016
    “…The overall research objective is to develop a computer algorithm for real-time sensorization for optical sensor characterization. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Active force control with iterative learning control algorithm for a vehicle suspension by Rosmazi, Rosli

    Published 2013
    “…A number of ILC algorithms were explicitly employed to compute the estimated mass in the AFC loop that is necessary to trigger the control action. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Examination timetabling using genetic algorithm case study: KUiTTHO by Mohd Salikon, Mohd Zaki

    Published 2005
    “…Genetic Algorithm (GA) is one of the most popular optimization solutions. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Discretization of crack propagation on parallel computing : complexity and parallel algorithms with source code by Alias, Norma, Islam, Md. Rajibul

    Published 2010
    “…The mathematical model was developed by using the relationship between the forces applied to the individual elements and the nodal displacements. …”
    Get full text
    Get full text
    Get full text
    Book Section
  20. 20

    ECG encryption enhancement with multi-layers of AES and DNA computing by Kh-Madhloom, Jamal

    Published 2023
    “…IoT study fields currently involve security and privacy due to the fact that the installation of Cryptographic Internet Communications "ICs" for protected IC applications like Fog Computing and Cloud Computing devices is extremely crucial in any developing technology. …”
    Get full text
    Get full text
    Get full text
    Thesis