Search Results - (( development programme optimisation algorithm ) OR ( java data control algorithm ))
Search alternatives:
- optimisation algorithm »
- data control »
- programme »
- java »
-
1
Develpoment of combinatorial optimisation for cutting tool path strategy
Published 2009“…To simulate the physical removal of material during machining, a finite element model is designed to represent a thin walled workpiece. The target was to develop models which mimic the actual cutting process using the Finite Element Method (FEM) and to validate the developed tool path strategy algorithm with the actual machining process and to programmer the developed algorithm into software. …”
Get full text
Get full text
Conference or Workshop Item -
2
An experimental validation and optimisation tool path strategy for thin walled structure
Published 2011“…To simulate the physical removal of material during machining, a finite element model was designed to represent a thin walled workpiece. The target was to develop models which mimic the actual cutting process using the finite element method (FEM), to validate the developed tool path strategy algorithm with the actual machining process and to programme the developed algorithm into the software. …”
Get full text
Get full text
Get full text
Article -
3
Design Of Robot Motion Planning Algorithm For Wall Following Robot
Published 2006“…Computer A will be sent the data to computer B through the internet/LAN using JAVA program. …”
Get full text
Get full text
Monograph -
4
Café Web Based System Using Priority Scheduling Approach
Published 2017“…The priority scheduling algorithm is based on Control Processing Unit scheduling algorithm where it has a priority to execute tasks. …”
Get full text
Get full text
Conference or Workshop Item -
5
A random search based effective algorithm for pairwise test data generation
Published 2011Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Automated time series forecasting
Published 2011“…Moving Average, Decomposition, Exponential Smoothing, Time Series Regressions and ARIMA) were used.The algorithm was developed in JAVA using up to date forecasting process such as data partition, several error measures and rolling process.Successfully, the results of the algorithm tally with the results of SPSS and Excel.This automatic forecasting will not just benefit forecaster but also end users who do not have in depth knowledge about forecasting techniques.…”
Get full text
Get full text
Get full text
Monograph -
7
A cluster-based hybrid replica control protocol for high availability in data grid
Published 2019“…Therefore, a replica control protocol must consider the dynamic aspects of the Data Grid. …”
Get full text
Get full text
Thesis -
8
Computerised Heuristic Algorithm for Multi-location Lecture Timetabling
Published 2020“…After that, the algorithm proceeds to Group Allocation Stage in a round robin optimisation. …”
Get full text
Get full text
Get full text
Thesis -
9
Biometric identification with limited data set
Published 2019Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
10
Using genetic algorithms to optimise land use suitability
Published 2012Get full text
Get full text
Thesis -
11
Implementation of luo-rudi phase 1 cardiac cell excitation model in FPGA
Published 2017“…By implementing the constructed algorithm into the high performance FPGA system, a new real-time simulation-based analysis technique of cardiac electrical excitation has been successfully developed.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
-
13
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
Get full text
Get full text
Get full text
Article -
14
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
15
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
Get full text
Get full text
Get full text
Academic Exercise -
16
Three-dimensional structure of Human Epididymis Protein 4 (HE4): a protein modelling of an ovarian cancer biomarker through in silico approach
Published 2024“…PROCHECK and ERRAT programmes were employed to assess the structure quality. …”
Get full text
Get full text
Get full text
Get full text
Article -
17
-
18
-
19
Efficient reconfigurable architectures for 3-D medical image compression
Published 2010“…These have provided an impetus to the development of other applications, in particular telemedicine and teleradiology. …”
Get full text
Get full text
Thesis
