Search Results - (( developing force connection algorithm ) OR ( java data normalization algorithm ))
Search alternatives:
- normalization algorithm »
- connection algorithm »
- data normalization »
- developing force »
- force connection »
- java »
-
1
Node placement optimization using extended virtual force and cuckoo search algorithm in wireless sensor network
Published 2014“…The performance of Extended Virtual Force-Based Algorithm (EVFA) and Cuckoo Search (CS) algorithm are evaluated and EVFA shows the improvement of coverage area and exhibits a guaranteed connectivity compared to CS algorithm. …”
Get full text
Get full text
Get full text
Thesis -
2
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…Even a normal people using clustering to grouping their data. …”
Get full text
Get full text
Thesis -
3
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
4
Development of airbag suit system for motorcyclist
Published 2014“…An airbag inside inflated automatically when a pin connecting the jacket to the bike was pulled from its socket forcefully. …”
Get full text
Get full text
Get full text
Article -
5
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Electing the best set of features will help to improve the classifier predictions in terms of the normal and abnormal pattern. The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
Get full text
Get full text
Thesis -
6
Implication of image processing algorithm in remote sensing and GIS applications
Published 2011“…This review presents evaluation and utilization of different algorithms such as Simple Recursive Algorithm, Backtracking Algorithm, Divide and Conquer Algorithm, Dynamic Algorithm, Branch and Bound Algorithm, Brute Force Algorithm and Randomized Algorithm. …”
Get full text
Get full text
Get full text
Article -
7
Development of optimized damage prediction method for health monitoring of ultra high performance fiber-reinforced concrete communication tower
Published 2018“…Damaging the full-scale tower is not practical; thus, two different parts of the tower segments and their connections (1-2 and 2-3) are considered and tested experimentally with and without damage to validate the capability of the developed hybrid algorithm to detect damage. …”
Get full text
Get full text
Thesis -
8
A study on data-driven impedance matching in four channels bilateral teleoperation
Published 2019“…The main objective of this research is to design and develop control algorithms to drive both sides of the master and slave system to attain symmetrical impedance between them. …”
Get full text
Get full text
Research Report -
9
Modular motor driver with torque control for gripping mechanism
Published 2023“…In implementing the project, several algorithms were tested to achieve the torque control algorithm requirement including on-off algorithm, P algorithm, PI algorithm, PD algorithm and PID algorithm. …”
Conference paper -
10
Challenges of hidden data in the unused area two within executable files
Published 2009“…The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
Get full text
Get full text
Get full text
Article -
11
Computational methods for self-assembly of DNA nanostructures / Ong Hui San
Published 2016“…Several approaches have been adopted including development of an autonomous tool that incorporated evolutionary optimization algorithm in constructing these heterogeneous DNA shapes and the application of heuristic through undirected graph theory as an annotation schema to produce the connectivity maps. …”
Get full text
Get full text
Thesis -
12
Cryptanalysis and design of chaos based image encryption schemes
Published 2025“…This results in the development of the Logistic-Beta map, the 2D-Henonlog map, and the 2D-Sine-Henon Chaotic Map (2D-SHCM). …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
13
Digital closed loop controller of hydraulic cylinder using linear transducer / Mohd. Aizuddin Khalid
Published 2010“…SIMULINK is integrated with MATLAB, providing immediate access to an extensive range of tools that can develop algorithms, analyze and visualize simulations, customize the modeling environment, define signal, parameter, and test data. …”
Get full text
Get full text
Thesis -
14
Computer remote monitoring via mobile phones using socket programming / Samih Omer Fadlelmola Elkhider
Published 2011“…The studies show beyond technical algorithms, physical aspects plays a big rule in client server model. …”
Get full text
Get full text
Thesis -
15
Mode division multiplexing zero forcing equalisation scheme using LU factorization
Published 2016“…These technique mainly rely on Least Mean Squared (LMS) and Recursive Least Squared (RLS) algorithms. The purpose of this study is to introduce a Zero Forcing LU-based equalization scheme for MDM. …”
Get full text
Get full text
Get full text
Thesis -
16
Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions
Published 2017“…Two sets of experimental data involving 20 diabetic patients and 20 healthy subjects were collected from CITO laboratory Semarang Central Java, Indonesia. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
17
-
18
Vibration-based structural damage detection and system identification using wavelet multiresolution analysis / Seyed Alireza Ravanfar
Published 2017“…Initially, the connection coefficients for the scaling function of the proper selection of Daubechies wavelets are developed to derive the velocity and displacement from the measured acceleration responses. …”
Get full text
Get full text
Get full text
Thesis -
19
Real-time face mask detection using YOLOv4
Published 2022“…Moreover, this application is also connected to the MySQL database to store the detection results. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
20
ICS cyber attack detection with ensemble machine learning and DPI using cyber-Kit datasets
Published 2021“…However, new business requirements associated with the efficiency benefits of digitalization are forcing increased connectivity between IT and OT networks, thereby increasing the attack surface and hence the cyber risk. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper
