Search Results - (( developing communication force algorithm ) OR ( java implication based algorithm ))

  • Showing 1 - 15 results of 15
Refine Results
  1. 1

    Labview Based Pid Algorithm Development for Z Motion Control in Atomic Force Microscopy by Teh, Yong Hui

    Published 2015
    “…In order to combine my hardware and software together, I have been written a PID algorithm in LabVIEW which can be communicate with the NI ELVIS to the piezoelectric buzzer to achieve Z motion control in atomic force microscopy.…”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  2. 2

    Development of optimized damage prediction method for health monitoring of ultra high performance fiber-reinforced concrete communication tower by Gatea, Sarah Jabbar

    Published 2018
    “…Therefore, this study aims to develop a new health monitoring system for communication towers based on AdaBoost, Bagging, and RUSBoost algorithms as hybrid algorithm, which can predict the damage by using noisy, random, unstable, and skewed frequency data with high accuracy. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Modular motor driver with torque control for gripping mechanism by How D.N.T., Baharuddin M.Z., Mohideen S.S.K., Sahari K.S.M., Anuar A.

    Published 2023
    “…In implementing the project, several algorithms were tested to achieve the torque control algorithm requirement including on-off algorithm, P algorithm, PI algorithm, PD algorithm and PID algorithm. …”
    Conference paper
  5. 5

    ECG encryption enhancement with multi-layers of AES and DNA computing by Kh-Madhloom, Jamal

    Published 2023
    “…In order to more effectively incorporate both present technology and developing technology, models of DNA cryptography need to be developed. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Delay-Aware Energy-Efficient Joint Power Control and Mode Selection in Device-to-Device Communications for FREEDM Systems in Smart Grids by Fauzun Abdullah Asuhaimi, Muhammad Ali Imran, Shengrong Bu, Joao Pedro Battistella Nadas

    Published 2024
    “…We propose a joint power control and mode selection scheme to deal with the problem and develop a brute-force-based algorithm to find the solutions. …”
    Article
  7. 7
  8. 8

    Mode division multiplexing zero forcing equalisation scheme using LU factorization by Mohamed, Ahmed Sayed

    Published 2016
    “…These technique mainly rely on Least Mean Squared (LMS) and Recursive Least Squared (RLS) algorithms. The purpose of this study is to introduce a Zero Forcing LU-based equalization scheme for MDM. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Embedded System Object Tracking using CMU Camera by Narayanan, Aghilan

    Published 2014
    “…Then we’ll develop the color tracking algorithm to track a color and ask the camera to follow that colored object movement. …”
    Get full text
    Get full text
    Final Year Project
  11. 11

    Enhanced Ad Hoc On-Demand Distance Vector Routing Protocol For Mobile Ad Hoc Network Internet Connectivity by Gurusamy, Gobi

    Published 2006
    “…Hence, the mobile nodes are able to communicate beyond their transmission range by supporting multi hop communication. …”
    Get full text
    Get full text
    Thesis
  12. 12

    ICS cyber attack detection with ensemble machine learning and DPI using cyber-Kit datasets by Mubarak, Sinil, Habaebi, Mohamed Hadi, Islam, Md. Rafiqul, Khan, Sheroz

    Published 2021
    “…The processed metadata is normalized for the easiness of algorithm analysis and modelled with machine learning-based latest deep learning ensemble LSTM algorithms for anomaly detection. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  13. 13

    Multistage quality control in manufacturing process using blockchain with machine learning technique by Gu, J., Zhao, L., Yue, X., Arshad, N.I., Mohamad, U.H.

    Published 2023
    “…The demand for predictive machine reliability and quality drives the development of intelligent manufacturing technologies. …”
    Get full text
    Get full text
    Article
  14. 14

    Secure multi-authority attribute-based encryption access control with cache-aware scheduling in mobile cloud computing by Jamal, Fara

    Published 2021
    “…By leveraging the existing work, a cache-aware scheduling technique was developed to minimize communication and read time between cloud storage and the mobile device to reduce the unavailability of required data. …”
    Get full text
    Get full text
    Thesis
  15. 15