Search Results - (( exploring force function algorithm ) OR ( java based verification algorithm ))

  • Showing 1 - 12 results of 12
Refine Results
  1. 1
  2. 2

    A real-time algorithm of optical tactile sensor for surface characterization / Nurul Fathiah Mohamed Rosli by Mohamed Rosli, Nurul Fathiah

    Published 2016
    “…The overall image analysis technique involves the following algorithms: image acquisition (capturing of images), processing (thresholding, noise filtering and boundary detection) and recognition (force measurement). …”
    Get full text
    Get full text
    Thesis
  3. 3

    Comparison between Lamarckian Evolution and Baldwin Evolution of neural network by Taha, Imad, Inazy, Qabas

    Published 2006
    “…Hybrid genetic algorithms are the combination of learning algorithms(Back propagation), usually working as evaluation functions, and genetic algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Modeling and multi-objective optimal sizing of standalone photovoltaic system based on evolutionary algorithms by Ridha, Hussein Mohammed

    Published 2020
    “…Moreover, the total force formula is simplified to speed up the exploration for an optimal solution. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Nonlinear response prediction of spar platform using artificial neural network / Md. Alhaz Uddin by Md. Alhaz , Uddin

    Published 2012
    “…During oil and gas exploration, floating offshore structures may sometimes be affected by critical environmental forces. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…For this research, several set of robots by using Lego has been developed and it uses LeJos and C programming techniques as a platform. A Java-based robot development tool has been set up as alternative programming methods incorporating LeJos and the controller. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC by Ismail, Haqi Khalid

    Published 2021
    “…The offline scheme utilizes a Time-based One-Time Password (TOTP) algorithm to allow users to authenticate to the vehicle without needing an Internet connection once they have registered online when Internet access is available. …”
    Get full text
    Get full text
    Thesis
  8. 8

    A framework of test case prioritisation in regression testing using particle swarm-artificial bee colony algorithm by Ba-Quttayyan, Bakr Salim Abdullah

    Published 2024
    “…The developed framework, grounded in fault-based testing theory, comprises three key components: inputs, prioritization factors, and a prioritization algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Enhanced gravitational search algorithm for nano-process parameter optimization problem / Norlina Mohd Sabri by Mohd Sabri, Norlina

    Published 2020
    “…Enhancements could also be done to eGSA by exploring the possibility to hybrid the algorithm with other well-known meta heuristic algorithms.…”
    Get full text
    Get full text
    Thesis
  10. 10

    Fuzzy logic controller for electronic ballast fluorescent lamp with fiber optic by Moin, Azham Norhezry

    Published 2007
    “…Fuzzy techniques have been successfully used in control in several fields, and engineers and researchers are today considering fuzzy logic algorithms in order to implement intelligent functions in embedded systems. …”
    Get full text
    Get full text
    Student Project
  11. 11

    An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications by Hydara, Isatou

    Published 2015
    “…This research work was limited to Java based web applications. In future research, the method can be extended to include other programming languages as well as other similar web application security vulnerabilities.…”
    Get full text
    Get full text
    Thesis
  12. 12