Search Results - (( intelligence ii force algorithm ) OR ( intelligence based rsa algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3
  4. 4

    An Intelligent Active Force Control Algorithm to Control an Upper Extremity Exoskeleton for Motor Recovery by Wan Hasbullah, Mohd Isa, Zahari, Taha, Ismail, Mohd Khairuddin, Anwar, P. P. A. Majeed, Khairul Fikri, Muhammad, Ali, Mohammed A. H., Jamaluddin, Mahmud, Zulkifli, Mohamed

    Published 2016
    “…This paper presents the modelling and control of a two degree of freedom upper extremity exoskeleton by means of an intelligent active force control (AFC) mechanism. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    A hybrid intelligent active force controller for robot arms using evolutionary neural networks by Hussein, S.B, Jamaluddin, H, Mailah, M, Zalzala, A.M.S

    Published 2000
    “…The EC part of the algorithm composes of a hybrid genetic algorithm (GA) and an evolutionary program (EP). …”
    Get full text
    Get full text
    Article
  6. 6
  7. 7
  8. 8

    Hybrid intelligent active force controller for robot arms using evolutionary neural networks by Hussein, S. B., Jamaluddin, H., Mailah, M., Zalzala, A. M. S.

    Published 2000
    “…The EC part of the algorithm composes of a hybrid genetic algorithm (GA) and an evolutionary program (EP). …”
    Get full text
    Get full text
    Article
  9. 9
  10. 10
  11. 11
  12. 12

    Quantum-Resistant Cryptography in Cyber Security by Bhargavgowda, A.B., Chitra, K.

    Published 2025
    “…While quantum systems promise advances in science, engineering, and artificial intelligence, they also pose a substantial threat to classical cryptographic techniques such as RSA, ECC, and other widely deployed public-key mechanisms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Adaptive resource allocation algorithms with QoS support based on network conditions using fuzzy logic system for IEEE 802.11n networks / Bakeel Hussein Naji Maqhat by Naji Maqhat, Bakeel Hussein

    Published 2016
    “…The second contribution is an efficient bandwidth allocation algorithm for A-MSDU aggregation called Adaptive Scheduling based Embedded Fuzzy (ASEF) system. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Intelligent material handling mobile robot for industrial purpose with active force control capability by Mailah, Musa, Jamaluddin, Hishamuddin, Pitowarno, Endra, Purnomo, Didik Setyo

    Published 2005
    “…An integrated kinematic and dynamic control with embedded intelligent algorithms were the main approaches employed for the robust motion control of a mobile manipulator (MM) comprising a differentially driven wheeled mobile base platform with a two-link planar arm mounted on top of the platform. …”
    Get full text
    Get full text
    Monograph
  15. 15

    Development of a robust intelligent controller for a semi-active car suspension system by Abas, Hesham Ahmed Abdul Mutleba

    Published 2022
    “…Semi-active suspension systems outperformed passive and active suspension systems because it contains an intelligent actuator that can give the appropriate force to dissipate unwanted vibration using intelligent and real-time controllers. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17
  18. 18

    Prediction of Optimum Cutting Conditions in Dry Turning Operations of S45C Mild Steel using AIS and PSO Intelligent Algorithm by Minhat, Mohamad, Abd Rahman, Md Nizam, Abbas, Adnan Jameel

    Published 2014
    “…Experimental results showed that the average accuracy of the AIS algorithm is 94.37 %, whereas that of the PSO algorithm is 92.84 % which indicated that the two percentages are convergent.…”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    A proposed model for text and image encryption using different techniques by Shawkat S.A., Al-Barazanchi I.

    Published 2023
    “…In this paper, the Rivest Shamir Adleman 3 key (RSA3k) algorithm is used but in a new technique to encrypt and decrypt text. …”
    Article
  20. 20