Search Results - (( development from interception algorithm ) OR ( java application reoptimize algorithm ))
Search alternatives:
- interception algorithm »
- application reoptimize »
- development from »
- java application »
-
1
Implementation of local proprietary symmetric and asymmetric algorithm as secure plug-in on microsoft outlook / Mohd Izhar Jaafar
Published 2012“…New integration also have an extra value security because of the symmetric algorithm was developed locally in Malaysia. Apart from symmetric algorithm, Public Key Infrastructure technologies that one of the asymmetric algorithm have been select as a part of new integration. …”
Get full text
Get full text
Thesis -
2
Development of algorithm for single axis sun tracking system
Published 2016“…The output power from a solar panel depends on the amount of sunlight that is intercepted by the photovoltaic (PV) solar panel. …”
Get full text
Get full text
Conference or Workshop Item -
3
Rekabentuk, Analisis Dan Perlaksanaan Sistem Ka Walan Meriam
Published 1999“…time taken by a shell and a target to arrive at the same position which is known as point of intercept. The prediction algorithm has been developed using numerical method which tunes the time of flight and gun aiming point to obtain the point of intercept error within an acceptable maximum value or predetermined tuning iteration. …”
Get full text
Get full text
Thesis -
4
Optimal Real Time Evasion against High Speed Pursuer Using Evolutionary Programming
Published 2006“…The pursuer simply home-in to the evader and the evader follows the trajectory suggested from the algorithm. In both scenarios, the evader is able to steer itself from interception.…”
Get full text
Get full text
Conference or Workshop Item
