Search Results - (( development from interception algorithm ) OR ( java application reoptimize algorithm ))

  • Showing 1 - 4 results of 4
Refine Results
  1. 1

    Implementation of local proprietary symmetric and asymmetric algorithm as secure plug-in on microsoft outlook / Mohd Izhar Jaafar by Jaafar, Mohd Izhar

    Published 2012
    “…New integration also have an extra value security because of the symmetric algorithm was developed locally in Malaysia. Apart from symmetric algorithm, Public Key Infrastructure technologies that one of the asymmetric algorithm have been select as a part of new integration. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Development of algorithm for single axis sun tracking system by Yi, L.Z., Singh, B.S.M., Ching, D.L.C., Jin, C.L.E.

    Published 2016
    “…The output power from a solar panel depends on the amount of sunlight that is intercepted by the photovoltaic (PV) solar panel. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Rekabentuk, Analisis Dan Perlaksanaan Sistem Ka Walan Meriam by Mat Amin, Zainal Abidin

    Published 1999
    “…time taken by a shell and a target to arrive at the same position which is known as point of intercept. The prediction algorithm has been developed using numerical method which tunes the time of flight and gun aiming point to obtain the point of intercept error within an acceptable maximum value or predetermined tuning iteration. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Optimal Real Time Evasion against High Speed Pursuer Using Evolutionary Programming by Nusyirwan, Istas F., Bil, Cees

    Published 2006
    “…The pursuer simply home-in to the evader and the evader follows the trajectory suggested from the algorithm. In both scenarios, the evader is able to steer itself from interception.…”
    Get full text
    Get full text
    Conference or Workshop Item