Search Results - (( develop mapping force algorithm ) OR ( java application learning algorithm ))
Search alternatives:
- application learning »
- learning algorithm »
- java application »
- develop mapping »
- force algorithm »
- mapping force »
-
1
Labview Based Pid Algorithm Development for Z Motion Control in Atomic Force Microscopy
Published 2015“…Therefore, the main objective in this thesis is to develop a PID algorithm for Z motion control. As the scanning probe move in XY direction, if the tips has going up/down caused the laser does not stay at the center of photodetector. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
2
-
3
Software User Interface and Algorithm Development for Signal and Noise Characterization
Published 2015“…Atomic force microscopy (AFM) also known as “Scanning force microscopy (SFM)” is high resolution scanning probe. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
4
-
5
An Educational Tool Aimed at Learning Metaheuristics
Published 2020“…In this paper, we introduce an education tool for learning metaheuristic algorithms that allows displaying the convergence speed of the corresponding metaheuristic upon setting/changing the dependable parameters. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Securing password authentication using MD5 algorithm
Published 2014“…Process of authentication can be defined as developing a unique mapping process from given password to some other unique information in a defined domain. …”
Get full text
Get full text
Undergraduates Project Papers -
7
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
Get full text
Get full text
Get full text
Thesis -
8
Cryptanalysis and design of chaos based image encryption schemes
Published 2025“…This results in the development of the Logistic-Beta map, the 2D-Henonlog map, and the 2D-Sine-Henon Chaotic Map (2D-SHCM). …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
9
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…This thesis is based on the application of sentiment classification algorithm to tweet data with the goal of classifying messages based on the polarity of sentiment towards a particular topic (or subject matter). …”
Get full text
Get full text
Get full text
Thesis -
10
Development Of Machine Learning User Interface For Pump Diagnostics
Published 2022Get full text
Get full text
Monograph -
11
AI powered asthma prediction towards treatment formulation: an android app approach
Published 2022“…TensorFlow is utilized to integrate machine learning with an Android application. We accomplished asthma therapy using an Android application developed in Java and running on the Android Studio platform.…”
Get full text
Get full text
Get full text
Article -
12
AI powered asthma prediction towards treatment formulation : An android app approach
Published 2022“…TensorFlow is utilized to integrate machine learning with an Android application. We accomplished asthma therapy using an Android application developed in Java and running on the Android Studio platform.…”
Get full text
Get full text
Get full text
Article -
13
-
14
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Features selection process can be considered a problem of global combinatorial optimization in machine learning. Genetic algorithm GA had been adopted to perform features selection method; however, this method could not deliver an acceptable detection rate, lower accuracy, and higher false alarm rates. …”
Get full text
Get full text
Thesis -
15
Modular motor driver with torque control for gripping mechanism
Published 2023“…In implementing the project, several algorithms were tested to achieve the torque control algorithm requirement including on-off algorithm, P algorithm, PI algorithm, PD algorithm and PID algorithm. …”
Conference paper -
16
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
17
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…On the Construction phase, the development of the prototype has been started. All the algorithm for the engine has been developed by using Java script language. …”
Get full text
Get full text
Thesis -
18
Multi-array sensorised pillowcase as call detection alarm system for in ward tetraplegic patient / Normazlianita Mohamad Alias
Published 2021“…Findings from this case study have demonstrated the ability to map the force on the surface of the pillow and subsequently the location of the force applied with 71% accuracy and 70% sensitivity. …”
Get full text
Get full text
Get full text
Thesis -
19
Computational methods for self-assembly of DNA nanostructures / Ong Hui San
Published 2016“…The efforts are concerted towards self-assembly mechanism of heterogeneous DNA shapes, construction of multiple configurations that can form the identical endstructures, exploration of a less stringent sequence design and predicting connectivity map for the DNA nanostructures assembly. Several approaches have been adopted including development of an autonomous tool that incorporated evolutionary optimization algorithm in constructing these heterogeneous DNA shapes and the application of heuristic through undirected graph theory as an annotation schema to produce the connectivity maps. …”
Get full text
Get full text
Thesis -
20
Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform
Published 2009Get full text
Get full text
Get full text
Conference or Workshop Item
