Search Results - (( developing force connection algorithm ) OR ( java application optimisation algorithm ))

  • Showing 1 - 20 results of 20
Refine Results
  1. 1

    Node placement optimization using extended virtual force and cuckoo search algorithm in wireless sensor network by Puteri Azwa, Ahmad

    Published 2014
    “…The performance of Extended Virtual Force-Based Algorithm (EVFA) and Cuckoo Search (CS) algorithm are evaluated and EVFA shows the improvement of coverage area and exhibits a guaranteed connectivity compared to CS algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Development of airbag suit system for motorcyclist by Zainal Abidin, Zulkifli, Razali, Fakhruddin

    Published 2014
    “…An airbag inside inflated automatically when a pin connecting the jacket to the bike was pulled from its socket forcefully. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Web-based expert system for material selection of natural fiber- reinforced polymer composites by Ahmed Ali, Basheer Ahmed

    Published 2015
    “…Finally, the developed expert system was deployed over the internet with central interactive interface from the server as a web-based application. As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
    Get full text
    Get full text
    Thesis
  5. 5

    Implication of image processing algorithm in remote sensing and GIS applications by Pathan, Mubeena, Jusoff, Kamaruzaman, Mohd Sood, Alias, Razali, Yaakob, Qureshi, Barkatullah

    Published 2011
    “…This review presents evaluation and utilization of different algorithms such as Simple Recursive Algorithm, Backtracking Algorithm, Divide and Conquer Algorithm, Dynamic Algorithm, Branch and Bound Algorithm, Brute Force Algorithm and Randomized Algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Development of optimized damage prediction method for health monitoring of ultra high performance fiber-reinforced concrete communication tower by Gatea, Sarah Jabbar

    Published 2018
    “…Damaging the full-scale tower is not practical; thus, two different parts of the tower segments and their connections (1-2 and 2-3) are considered and tested experimentally with and without damage to validate the capability of the developed hybrid algorithm to detect damage. …”
    Get full text
    Get full text
    Thesis
  7. 7

    A study on data-driven impedance matching in four channels bilateral teleoperation by Ramli, Mohd Syakirin, Ahmad, Hamzah, Razali, Saifudin, Othman, Nur Aqilah, Daud, Mohd Razali, Irawan, Addie, Mohd Nizam, Md Isa

    Published 2019
    “…The main objective of this research is to design and develop control algorithms to drive both sides of the master and slave system to attain symmetrical impedance between them. …”
    Get full text
    Get full text
    Research Report
  8. 8

    Modular motor driver with torque control for gripping mechanism by How D.N.T., Baharuddin M.Z., Mohideen S.S.K., Sahari K.S.M., Anuar A.

    Published 2023
    “…In implementing the project, several algorithms were tested to achieve the torque control algorithm requirement including on-off algorithm, P algorithm, PI algorithm, PD algorithm and PID algorithm. …”
    Conference paper
  9. 9

    Computational methods for self-assembly of DNA nanostructures / Ong Hui San by Ong, Hui San

    Published 2016
    “…Several approaches have been adopted including development of an autonomous tool that incorporated evolutionary optimization algorithm in constructing these heterogeneous DNA shapes and the application of heuristic through undirected graph theory as an annotation schema to produce the connectivity maps. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Cryptanalysis and design of chaos based image encryption schemes by Wong , Kuan Wai

    Published 2025
    “…This results in the development of the Logistic-Beta map, the 2D-Henonlog map, and the 2D-Sine-Henon Chaotic Map (2D-SHCM). …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  11. 11

    Digital closed loop controller of hydraulic cylinder using linear transducer / Mohd. Aizuddin Khalid by Khalid, Mohd. Aizuddin

    Published 2010
    “…SIMULINK is integrated with MATLAB, providing immediate access to an extensive range of tools that can develop algorithms, analyze and visualize simulations, customize the modeling environment, define signal, parameter, and test data. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Computer remote monitoring via mobile phones using socket programming / Samih Omer Fadlelmola Elkhider by Omer Fadlelmola Elkhider, Samih

    Published 2011
    “…The studies show beyond technical algorithms, physical aspects plays a big rule in client server model. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Mode division multiplexing zero forcing equalisation scheme using LU factorization by Mohamed, Ahmed Sayed

    Published 2016
    “…These technique mainly rely on Least Mean Squared (LMS) and Recursive Least Squared (RLS) algorithms. The purpose of this study is to introduce a Zero Forcing LU-based equalization scheme for MDM. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    Vibration-based structural damage detection and system identification using wavelet multiresolution analysis / Seyed Alireza Ravanfar by Seyed Alireza, Ravanfar

    Published 2017
    “…Initially, the connection coefficients for the scaling function of the proper selection of Daubechies wavelets are developed to derive the velocity and displacement from the measured acceleration responses. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Real-time face mask detection using YOLOv4 by Tey, Chen Hup

    Published 2022
    “…Moreover, this application is also connected to the MySQL database to store the detection results. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  17. 17

    ICS cyber attack detection with ensemble machine learning and DPI using cyber-Kit datasets by Mubarak, Sinil, Habaebi, Mohamed Hadi, Islam, Md. Rafiqul, Khan, Sheroz

    Published 2021
    “…However, new business requirements associated with the efficiency benefits of digitalization are forcing increased connectivity between IT and OT networks, thereby increasing the attack surface and hence the cyber risk. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  18. 18

    RaspyAir: self-monitoring system for wireless intrusion detection using raspberry pi / Mohd Nizam Osman and Mohd Syafiq Aiman Mohamad Zulrahim by Osman, Mohd Nizam, Mohammad Zulrahim, Mohd Syafiq Aiman

    Published 2016
    “…This system was implemented using misuse detection approach, which is hybridization of tShark and Airodump-ng to capture the possibility of the traffic in the wireless environment. The brute-force algorithm is used to filter the traffic using signature based detection technique. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19
  20. 20

    Development Of Finite Element Codes For Shear Wall Analysis by Paknahad, Masoud

    Published 2008
    “…In this study, new elements have been developed, modified constitutive law has been proposed, new computational algorithm has been utilised. …”
    Get full text
    Get full text
    Thesis