Search Results - (( developing values force algorithm ) OR ( java validation using algorithm ))
Search alternatives:
- developing values »
- validation using »
- force algorithm »
- java validation »
- using algorithm »
- values force »
-
1
Intelligent Optimization of Force Tracking Parameters for MR Damper Modelling using Firefly Algorithm
Published 2020“…The controller parameters were tuned using intelligent FA method in order to find the optimum values which would identify the accuracy of the force tracking that followed the MR damping force. …”
Get full text
Get full text
Get full text
Proceeding -
2
Node placement optimization using extended virtual force and cuckoo search algorithm in wireless sensor network
Published 2014“…This study proposed Extended Virtual Force and Cuckoo Search (EVFCS) algorithm with a combination of EVFA and CS algorithm to find an optimal node placement. …”
Get full text
Get full text
Get full text
Thesis -
3
Priority and dynamic quantum time algorithms for central processing unit scheduling
Published 2018“…Central Processing Unit is scheduled using different types of scheduling algorithms. One of the most widely algorithm used in scheduling with sharing and batch operating systems is Round Robin. …”
Get full text
Get full text
Thesis -
4
Calibration of optical based silicone tactile sensor based on image deformation technique / Abdul Halim Esa
Published 2016“…Based on these three parameters, three different types of algorithm are developed in order to measure experimentally the forces and deformation based on optical information of the tactile sensor. …”
Get full text
Get full text
Thesis -
5
Performance comparison between skyhook and semi active damping force estimator (SADE) algorithms for semi active suspension system / S. A. Abu Bakar ... [et al.]
Published 2018“…The damping coefficient value for both of the algorithms are intended to use the same value, for a fair untuned comparison in investigating the algorithm’s advantages in improving ride comfort performance of a quarter car model. …”
Get full text
Get full text
Article -
6
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…The simulation model was developed using Active Server Page, JavaScript and SQL 7.0 as database. …”
Get full text
Get full text
Get full text
Thesis -
7
Real time self-calibration algorithm of pressure sensor for robotic hand glove system
Published 2019“…In traditional calibration method of FlexiForce sensor, the maximum calibration time is 20 min and the signal decrease is equal to 83% for sinusoidal excitations of frequency, amplitude, and mean value as reported in [5]. …”
Get full text
Get full text
Thesis -
8
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…In addition, the randomness of the session key generated from the MLCG is verified using NIST test suite. Besides that, the security of the proposed protocol is validated using the formal analysis tool, AVISPA. …”
Get full text
Get full text
Thesis -
9
Optical tactile sensor for robotic assisted surface characterization / Amir Abd Latif
Published 2016“…A new mathematical modelling and computer algorithm is developed and calibrated which are based on image processing methods. …”
Get full text
Get full text
Thesis -
10
Obstacle Avoidance by Steering and Braking with Minimum Total Vehicle Force
Published 2016“…In this study of automatic obstacle avoidance maneuver, a fast and precise algorithm for solving a two-point boundary value problem (TPBVP) is developed. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
A framework of test case prioritisation in regression testing using particle swarm-artificial bee colony algorithm
Published 2024“…Ten knowledge and domain experts provided positive feedback on the framework's verification, affirming the framework's robustness. Validation was conducted through three experiments involving four Java programs. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…On the Construction phase, the development of the prototype has been started. All the algorithm for the engine has been developed by using Java script language. …”
Get full text
Get full text
Thesis -
13
Relationship investigation of handgrip forces with varied wrist angles using forearm EMG for bionic hand
Published 2017“…The information relating handgrip force and wrist position to forearm muscle activity is important as control algorithm for controlling the prostheses or robotic hand gripping force. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
14
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…The circuits have been designed by proteus, the microcontrollers have been programmed by micro C, and the Graphical User Interface (GUI) has been implemented in Java. Few by electronic components such as RFID, multiplexer, XBee, and servo motors have been used to realize the system. …”
Get full text
Get full text
Thesis -
15
Two-axis position-based impedance control of a 2-DOF robotic finger / Khairunnisa Nasir
Published 2017“…The positionbased impedance control algorithm was designed by regulating the mechanical impedance of the robotic finger based on force measurements from the two embedded force sensors. …”
Get full text
Get full text
Thesis -
16
Improved criteria determination of an automated negative lightning return strokes characterisation using Brute-Force search algorithm
Published 2021“…Accordingly, the proposed Brute-Force search algorithm characterised the negative lightning return strokes parameters based on the seven parameters. …”
Get full text
Get full text
Thesis -
17
Machine learning model to predict the contact of angle using mineralogy, TOC and process parameters in shale
Published 2021“…The developed model has successful in prediction the contact angle for different input variables of the machine learning model with high r squared values. …”
Get full text
Get full text
Conference or Workshop Item -
18
Secure E-Voting With Blind Signature
Published 2003“…The voter’s private key for digital signature is protected by using password-based encryption with SHA and Twofish-CBC algorithm so that only valid voter can use it.…”
Get full text
Get full text
Conference or Workshop Item -
19
Surface defect detection and polishing parameter optimization using image processing for G3141 cold rolled steel
Published 2016“…To realize this, automatic cropping algorithm is developed to detect the region of interest and interpret the Ga value. …”
Get full text
Get full text
Thesis -
20
