Search Results - (( developing force connection algorithm ) OR ( java simulation optimisation algorithm ))
Search alternatives:
- simulation optimisation »
- optimisation algorithm »
- connection algorithm »
- developing force »
- force connection »
- java simulation »
-
1
Node placement optimization using extended virtual force and cuckoo search algorithm in wireless sensor network
Published 2014“…The performance of Extended Virtual Force-Based Algorithm (EVFA) and Cuckoo Search (CS) algorithm are evaluated and EVFA shows the improvement of coverage area and exhibits a guaranteed connectivity compared to CS algorithm. …”
Get full text
Get full text
Get full text
Thesis -
2
Development of airbag suit system for motorcyclist
Published 2014“…An airbag inside inflated automatically when a pin connecting the jacket to the bike was pulled from its socket forcefully. …”
Get full text
Get full text
Get full text
Article -
3
Implication of image processing algorithm in remote sensing and GIS applications
Published 2011“…This review presents evaluation and utilization of different algorithms such as Simple Recursive Algorithm, Backtracking Algorithm, Divide and Conquer Algorithm, Dynamic Algorithm, Branch and Bound Algorithm, Brute Force Algorithm and Randomized Algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Development of optimized damage prediction method for health monitoring of ultra high performance fiber-reinforced concrete communication tower
Published 2018“…Damaging the full-scale tower is not practical; thus, two different parts of the tower segments and their connections (1-2 and 2-3) are considered and tested experimentally with and without damage to validate the capability of the developed hybrid algorithm to detect damage. …”
Get full text
Get full text
Thesis -
5
A study on data-driven impedance matching in four channels bilateral teleoperation
Published 2019“…The main objective of this research is to design and develop control algorithms to drive both sides of the master and slave system to attain symmetrical impedance between them. …”
Get full text
Get full text
Research Report -
6
Modular motor driver with torque control for gripping mechanism
Published 2023“…In implementing the project, several algorithms were tested to achieve the torque control algorithm requirement including on-off algorithm, P algorithm, PI algorithm, PD algorithm and PID algorithm. …”
Conference paper -
7
Computational methods for self-assembly of DNA nanostructures / Ong Hui San
Published 2016“…Several approaches have been adopted including development of an autonomous tool that incorporated evolutionary optimization algorithm in constructing these heterogeneous DNA shapes and the application of heuristic through undirected graph theory as an annotation schema to produce the connectivity maps. …”
Get full text
Get full text
Thesis -
8
Cryptanalysis and design of chaos based image encryption schemes
Published 2025“…This results in the development of the Logistic-Beta map, the 2D-Henonlog map, and the 2D-Sine-Henon Chaotic Map (2D-SHCM). …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
9
Digital closed loop controller of hydraulic cylinder using linear transducer / Mohd. Aizuddin Khalid
Published 2010“…SIMULINK is integrated with MATLAB, providing immediate access to an extensive range of tools that can develop algorithms, analyze and visualize simulations, customize the modeling environment, define signal, parameter, and test data. …”
Get full text
Get full text
Thesis -
10
Computer remote monitoring via mobile phones using socket programming / Samih Omer Fadlelmola Elkhider
Published 2011“…The studies show beyond technical algorithms, physical aspects plays a big rule in client server model. …”
Get full text
Get full text
Thesis -
11
Mode division multiplexing zero forcing equalisation scheme using LU factorization
Published 2016“…These technique mainly rely on Least Mean Squared (LMS) and Recursive Least Squared (RLS) algorithms. The purpose of this study is to introduce a Zero Forcing LU-based equalization scheme for MDM. …”
Get full text
Get full text
Get full text
Thesis -
12
-
13
Vibration-based structural damage detection and system identification using wavelet multiresolution analysis / Seyed Alireza Ravanfar
Published 2017“…Initially, the connection coefficients for the scaling function of the proper selection of Daubechies wavelets are developed to derive the velocity and displacement from the measured acceleration responses. …”
Get full text
Get full text
Get full text
Thesis -
14
Real-time face mask detection using YOLOv4
Published 2022“…Moreover, this application is also connected to the MySQL database to store the detection results. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
15
ICS cyber attack detection with ensemble machine learning and DPI using cyber-Kit datasets
Published 2021“…However, new business requirements associated with the efficiency benefits of digitalization are forcing increased connectivity between IT and OT networks, thereby increasing the attack surface and hence the cyber risk. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
16
RaspyAir: self-monitoring system for wireless intrusion detection using raspberry pi / Mohd Nizam Osman and Mohd Syafiq Aiman Mohamad Zulrahim
Published 2016“…This system was implemented using misuse detection approach, which is hybridization of tShark and Airodump-ng to capture the possibility of the traffic in the wireless environment. The brute-force algorithm is used to filter the traffic using signature based detection technique. …”
Get full text
Get full text
Get full text
Article -
17
The development of secure interface system for wi-fi internet access using blended approach of captive portals and key verification techniques / Kamarul Ariffin Abdul Basit … [et a...
Published 2014“…Our approach should force all users in the environment to register in our SiS and get an electronic key before they have the permission to access the Internet. …”
Get full text
Get full text
Get full text
Book Section -
18
Development Of Finite Element Codes For Shear Wall Analysis
Published 2008“…In this study, new elements have been developed, modified constitutive law has been proposed, new computational algorithm has been utilised. …”
Get full text
Get full text
Thesis
