Search Results - (( developing communication force algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- developing communication »
- communication force »
- implication based »
- java implication »
- force algorithm »
-
1
Labview Based Pid Algorithm Development for Z Motion Control in Atomic Force Microscopy
Published 2015“…In order to combine my hardware and software together, I have been written a PID algorithm in LabVIEW which can be communicate with the NI ELVIS to the piezoelectric buzzer to achieve Z motion control in atomic force microscopy.…”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
2
Development of optimized damage prediction method for health monitoring of ultra high performance fiber-reinforced concrete communication tower
Published 2018“…Therefore, this study aims to develop a new health monitoring system for communication towers based on AdaBoost, Bagging, and RUSBoost algorithms as hybrid algorithm, which can predict the damage by using noisy, random, unstable, and skewed frequency data with high accuracy. …”
Get full text
Get full text
Thesis -
3
-
4
Modular motor driver with torque control for gripping mechanism
Published 2023“…In implementing the project, several algorithms were tested to achieve the torque control algorithm requirement including on-off algorithm, P algorithm, PI algorithm, PD algorithm and PID algorithm. …”
Conference paper -
5
ECG encryption enhancement with multi-layers of AES and DNA computing
Published 2023“…In order to more effectively incorporate both present technology and developing technology, models of DNA cryptography need to be developed. …”
Get full text
Get full text
Get full text
Thesis -
6
Delay-Aware Energy-Efficient Joint Power Control and Mode Selection in Device-to-Device Communications for FREEDM Systems in Smart Grids
Published 2024“…We propose a joint power control and mode selection scheme to deal with the problem and develop a brute-force-based algorithm to find the solutions. …”
Article -
7
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
8
Mode division multiplexing zero forcing equalisation scheme using LU factorization
Published 2016“…These technique mainly rely on Least Mean Squared (LMS) and Recursive Least Squared (RLS) algorithms. The purpose of this study is to introduce a Zero Forcing LU-based equalization scheme for MDM. …”
Get full text
Get full text
Get full text
Thesis -
9
-
10
Embedded System Object Tracking using CMU Camera
Published 2014“…Then we’ll develop the color tracking algorithm to track a color and ask the camera to follow that colored object movement. …”
Get full text
Get full text
Final Year Project -
11
Enhanced Ad Hoc On-Demand Distance Vector Routing Protocol For Mobile Ad Hoc Network Internet Connectivity
Published 2006“…Hence, the mobile nodes are able to communicate beyond their transmission range by supporting multi hop communication. …”
Get full text
Get full text
Thesis -
12
ICS cyber attack detection with ensemble machine learning and DPI using cyber-Kit datasets
Published 2021“…The processed metadata is normalized for the easiness of algorithm analysis and modelled with machine learning-based latest deep learning ensemble LSTM algorithms for anomaly detection. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
13
Multistage quality control in manufacturing process using blockchain with machine learning technique
Published 2023“…The demand for predictive machine reliability and quality drives the development of intelligent manufacturing technologies. …”
Get full text
Get full text
Article -
14
Secure multi-authority attribute-based encryption access control with cache-aware scheduling in mobile cloud computing
Published 2021“…By leveraging the existing work, a cache-aware scheduling technique was developed to minimize communication and read time between cloud storage and the mobile device to reduce the unavailability of required data. …”
Get full text
Get full text
Thesis -
15
The development of secure interface system for wi-fi internet access using blended approach of captive portals and key verification techniques / Kamarul Ariffin Abdul Basit … [et a...
Published 2014“…Our approach should force all users in the environment to register in our SiS and get an electronic key before they have the permission to access the Internet. …”
Get full text
Get full text
Get full text
Book Section
