Search Results - (( developing interactive circular algorithm ) OR ( java solution machine algorithm ))
Search alternatives:
- developing interactive »
- interactive circular »
- machine algorithm »
- java solution »
-
1
Computer Lab Timetabling Using Genetic Algorithm Case Study - Unit ICT
Published 2006Get full text
Get full text
Thesis -
2
Examination timetabling using genetic algorithm case study: KUiTTHO
Published 2005Get full text
Get full text
Thesis -
3
-
4
Network monopoly / Tan Kean Yeap
Published 2002“…With the powerful networking features of Java, it is expected that this project would produce a "real" game engine. …”
Get full text
Get full text
Thesis -
5
Development of open platform controller for step-NC compliant CNC system
Published 2020“…Therefore, this study covers the system which has been designed and developed from outdated and conventional PROLIGHT 1000 Milling CNC machine from Light Intelitek as the lesser cost solution which further discussed in detail based upon upgrades of hardware, architecture, and algorithm design. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
6
Adaptive mesh refinement immersed boundary method for simulations of laminar flows past a moving thin elastic structure
Published 2020“…Hence, in this work, an algorithm is developed to simulate fluid-structure interactions of moving deformable structures with very thin thicknesses. …”
Get full text
Get full text
Article -
7
Machine learning‐based approach for bandwidth and frequency prediction of circular SIW antenna
Published 2025“…A predictive ML framework was developed using six regression algorithms trained on significant geometrical parameters, such as ring slot radius, via diameter, and feedline width. …”
Get full text
Get full text
Get full text
Article -
8
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…The outcome of this study will add to the body of knowledge the most important and recent proposed solutions to mitigate SQL injection attack, in particular those based on machine learning algorithm…”
Get full text
Get full text
Get full text
Article -
9
STUDIES ON THE NONLINEAR INTERACTIONS ASSOCIATED WITH MOORED SEMI SUBMERSIBLE OFFSHORE PLATFORMS
Published 2011“…Mooring to seabed nonlinear interactions were modeled assuming that the mooring line rested on an elastic dissipative foundation. …”
Get full text
Get full text
Thesis -
10
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…The offline scheme utilizes a Time-based One-Time Password (TOTP) algorithm to allow users to authenticate to the vehicle without needing an Internet connection once they have registered online when Internet access is available. …”
Get full text
Get full text
Thesis
