Search Results - (( evolution optimization bat algorithm ) OR ( data implementation force algorithm ))
Search alternatives:
- evolution optimization »
- implementation force »
- data implementation »
- optimization bat »
- force algorithm »
- bat algorithm »
-
1
Multi-Swarm bat algorithm
Published 2023“…In this study a new Bat Algorithm (BA) based on multi-swarm technique called the Multi-Swarm Bat Algorithm (MSBA) is proposed to address the problem of premature convergence phenomenon. …”
Article -
2
Quality of service and energy efficient aware (QEEA) scheduling algorithm for long term evolution (LTE) network / Nurulanis Mohd Yusoff
Published 2017“…Basically, the QEEA is based on the Time Domain (TD) and Frequency Domain (FD) scheduling where it is dependent on the QoS requirements to allocate resources. The proposed algorithm is compared against other scheduling algorithms, namely, the Channel and QoS Aware (CQA), Priority Set Scheduler (PSS), Proportional Fair (PF), Maximum Throughput (MT) and Blind Average Throughput (BAT). …”
Get full text
Get full text
Thesis -
3
Software User Interface and Algorithm Development for Signal and Noise Characterization
Published 2015“…The output data display in array is implement to display in two dimension array with X-axis direction and Yaxis direction.…”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
4
-
5
Real time self-calibration algorithm of pressure sensor for robotic hand glove system
Published 2019“…The model was tested using an untrained input data set in order to verify the Proposed model’s capability for implementing a self-calibration algorithm. …”
Get full text
Get full text
Thesis -
6
Development of a robotic hand glove system for secure grasp with AI wireless sensor data
Published 2023“…It is composed of five low-cost force sensors attached to the glove’s fingertips and wireless data logger. …”
Get full text
Get full text
Conference or Workshop Item -
7
Features selection for IDS in encrypted traffic using genetic algorithm
Published 2013“…This paper presents a hybrid feature selection using Genetic Algorithm and Bayesian Network to improve Brute Force attack detection in Secure Shell (SSH) traffic.Brute Force attack traffic collected in a client-server model is implemented in proposed method.Our results prove that the most efficient features were selected by proposed method.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
-
9
Features selection for ids in encrypted traffic using genetic algorithm
Published 2013“…Brute Force attack traffic collected in a client-server model is implemented in proposed method. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
-
11
SENSORY EXPERT: DEVICE FOR SENSORY TEST
Published 2018“…The data is then sent to a Gmail as a storage by developing algorithm in Wi-Fi module NodeMCU ESP8266. …”
Get full text
Get full text
Final Year Project -
12
Efficient and secured compression and steganography technique in wireless sensor network
Published 2016“…First, the new data compression algorithm is proposed for compressing sensed data before it gets transmitted to the sink. …”
Get full text
Get full text
Get full text
Thesis -
13
Digital closed loop controller of hydraulic cylinder using linear transducer / Mohd. Aizuddin Khalid
Published 2010“…The personal computer is for generating the outputs/inputs signals, from MATLAB/SIMULINK software package, to the data acquisition board. SIMULINK is integrated with MATLAB, providing immediate access to an extensive range of tools that can develop algorithms, analyze and visualize simulations, customize the modeling environment, define signal, parameter, and test data. …”
Get full text
Get full text
Thesis -
14
Financial time series predicting using machine learning algorithms
Published 2013“…Subsequently, Dynamic Time Warping (DTW) algorithm is utilised through brute force to predict the trend movement. …”
Get full text
Thesis -
15
Key schedule algorithm based on coordinate geometry of a three-dimensional hybrid cube
Published 2019“…Cryptographic algorithms play an important role in information security where it ensures the security of data across the network or storage. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
16
Key generation technique based on triangular coordinate extraction for hybrid cubes
Published 2017“…Cryptographic algorithms play an important role in information security where it ensures the security of data across the network or storage. …”
Get full text
Get full text
Article -
17
Hysteresis Modelling of Pneumatic Artificial Muscle using General Cubic Equation and Factor Theorem Prediction Method / Mohd Azuwan Mat Dzahir...[et al.]
Published 2017“…However, implementing a complicated control algorithm does not always indicate the best solution that could be used to control the pneumatic artificial muscles. …”
Get full text
Get full text
Article -
18
Low fatigue walking-in-place locomotion technique for mobile VR using smartphone’s inertia sensors
Published 2020“…Bilateral Horizontal Impulse (BHI) detection algorithm is introduced to detect the positive and negative impulsive force captured from yaxis of accelerometer. …”
Get full text
Get full text
Thesis -
19
Thin Film Roughness Optimization In The Tin Coatings Using Genetic Algorithms
Published 2017“…In terms of optimization and reduction the experimental data, GAs could get the best lowest value for roughness compared to experimental data with reduction ratio of 46.75%.…”
Get full text
Get full text
Get full text
Article -
20
Gripping controller design for a one-degree-of-freedom robotic hand model based on slip detection
Published 2016“…A circuit is designed and implemented to collect the data of the sensors that would be analyzed. …”
Get full text
Get full text
Thesis
