Search Results - (( dynamic simulation table algorithm ) OR ( java application customization algorithm ))

  • Showing 1 - 18 results of 18
Refine Results
  1. 1

    Dynamic obstacle handling in multi-robot coverage by Tay, Wing Le

    Published 2024
    “…The simulations were conducted by using MATLAB to demonstrate the superiority of Modified Lloyd’s algorithm with VO over existing Lloyd’s algorithm in terms of average of total number of collisions between robots and dynamic obstacle during coverage task. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  2. 2

    Analysis of avalanche effect on advance encryption standard by using dynamic S-Box depends on rounds keys by Nejad, Farshid Hossein, Sabah, Saman, Jam, Amid Jamshidi

    Published 2014
    “…The parameters of the dynamic S-Box have features equivalent to those in the normal algorithm AES. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Modelling of multi-robot system for search and rescue by Poy, Yi Ler

    Published 2023
    “…This report focusses on developing a novel multi-robot path planning algorithm based on the Modified Particles Swarm Optimization (MPSO) algorithm for dynamic environments. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  4. 4

    An exponential based simulated kalman filter algorithm for data-driven PID tuning in liquid slosh controller by Mohd Falfazli, Mat Jusof, Ahmad Nor Kasruddin, Nasir, Mohd Ashraf, Ahmad, Zuwairie, Ibrahim

    Published 2018
    “…This paper presents an Exponent-based Simulated Kalman Filter (EbSKF) algorithm. SKF is a random based optimization algorithm inspired from a Kalman Filter theory. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    New DNA based dynamical S-Box for block cipher by Chng, Chern Wei, Md. Yasin, Sharifah, Abdullah, Mohd. Taufik, Udzir, Nur Izura

    Published 2018
    “…DNA-based techniques are able to provide a high degree of cryptography algorithm. This article discusses a new DNA based Dynamical S-Box for the symmetric keys block ciphers. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    A multiobjective simulated Kalman filter optimization algorithm by A. Azwan, A. Razak, Mohd Falfazli, Mat Jusof, Ahmad Nor Kasruddin, Nasir, Mohd Ashraf, Ahmad

    Published 2018
    “…It is a further enhancement of a single-objective Simulated Kalman Filter (SKF) optimization algorithm. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    An adaptive relay selection scheme for enhancing network stability in VANETs by Al-Kharasani, Ameen Mohammed Abdulkarem, Ahmad Zukarnain, Zuriati, Subramaniam, Shamala, Mohd Hanapi, Zurina

    Published 2020
    “…The results show that the proposed algorithm can improve network performance effectively relative to other algorithms.…”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Xcast Based Routing Protocol For Push To Talk Application In Mobile Ad Hoc Networks by Alzyoud, Faisal Yousef Abed-alrahman

    Published 2011
    “…To build the network topology and fill up the route table for nodes, the information in the route table is used to classify the XCAST list of destinations according to similarities on their next hop. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Xcast Based Routing Protocol For Push To Talk Application In Mobile Ad Hoc Networks by Al-Zyoud, Faisal Yousef Abed-alrahman

    Published 2011
    “…To build the network topology and fill up the route table for nodes, the information in the route table is used to classify the XCAST list of destinations according to similarities on their next hop. …”
    Get full text
    Get full text
    Thesis
  10. 10

    A Kalman-Filter-Based Sine-Cosine Algorithm by Mohd Falfazli, Mat Jusof, Shuhairie, Mohammad, Ahmad Azwan, Abd Razak, Ahmad Nor Kasruddin, Nasir, Mohd Riduwan, Ghazali, Mohd Ashraf, Ahmad, Addie Irawan, Hashim

    Published 2019
    “…This paper presents a Kalman-Filter-based Sine Cosine algorithm (KFSCA). It is a synergy of a Simulated Kalman Filter (SKF) algorithm and a Sine Cosine (SCA) algorithm. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11
  12. 12

    Efficient tag grouping RFID anti-collision algorithm for internet of things applications based on improved k-means clustering by Umelo, Nnamdi Henry, Noordin, Nor Kamariah, A. Rasid, Mohd Fadlee, Tan, Kim Geok, Hashim, Fazirulhisyam

    Published 2023
    “…Dynamic Frame Slotted ALOHA (DFSA) is a de facto algorithm in the EPC Global Class-1 Generation-2 protocol for Radio Frequency Identification (RFID) tag collision problem. …”
    Get full text
    Get full text
    Article
  13. 13

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Minimization of torque ripple and flux droop using optimal DTC switching and sector rotation strategy by Ahmad Tarusan, Siti Azura

    Published 2022
    “…Although DTC provides excellent dynamic torque control performance, but it has several drawbacks. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    On line fault detection for transmission line using power system stabilizer signals by Ali Falifla, Hamza AbuBeker

    Published 2007
    “…Then by using PST(Power System Toolbox) to build state variable models in small signal analysis, and for modeling of machines and control system for performing transient stability simulation of a power system, These dynamic models are coded as MATLAB functions. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Efficient hybrid flooding scheme for ad-hoc on-demand distance vector routing protocol in MANET by Waheed, Bassam M.S.

    Published 2014
    “…In this context, the algorithm responsible for determining whether or not the a node is gateway is adapted to check for such links, this is done by looking for mutual existence of nodes in the neighbor tables of their respective neighbors. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Reduced torque ripple and switching frequency using optimal DTC switching strategy for open-end winding induction machines by Abd Rahim, Muhd Khairi

    Published 2017
    “…Some improvements obtained in the proposed strategy were verified via simulations and experimentations, as well as comparison with the conventional DTC. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis