Search Results - (( java application modified algorithm ) OR ( network implementation force algorithm ))

Refine Results
  1. 1

    Node placement optimization using extended virtual force and cuckoo search algorithm in wireless sensor network by Puteri Azwa, Ahmad

    Published 2014
    “…This study proposed Extended Virtual Force and Cuckoo Search (EVFCS) algorithm with a combination of EVFA and CS algorithm to find an optimal node placement. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    An intelligent method to estimate the inertia matrix of a robot arm for active force control using on-line neural network training scheme by Hussein, Shamsul Bahri, Jamaluddin, Hishamuddin, Mailah, Musa

    Published 1999
    “…This paper presents a new intelligent controller algorithm comprising an on-line multi-layer artificial neural network (ANN) training scheme to estimate the inertia matrix of the robot arm to enhance the performance of the active force control (AFC) scheme. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3
  4. 4

    A new fair marker algorithm for DiffServ networks by Elshaikh, M.A., Mohamed, Othman, Subramaniam, Shamala, Md. Desa, Jalil

    Published 2008
    “…The paper design and implement the algorithm with extensive simulations using NS-2 simulator to compare the proposed algorithm with previous algorithms. …”
    Get full text
    Get full text
    Article
  5. 5
  6. 6

    Features selection for IDS in encrypted traffic using genetic algorithm by Barati, Mehdi, Abdullah, Azizol, Mahmod, Ramlan, Mustapha, Norwati, Udzir, Nur Izura

    Published 2013
    “…This paper presents a hybrid feature selection using Genetic Algorithm and Bayesian Network to improve Brute Force attack detection in Secure Shell (SSH) traffic.Brute Force attack traffic collected in a client-server model is implemented in proposed method.Our results prove that the most efficient features were selected by proposed method.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Practical implementation of skyhook and adaptive active force control to an automotive suspension system by Priyandoko, Gigih, Musa, Mailah, Jamaluddin, Hishamuddin

    Published 2008
    “…The paper focuses on the practical implementation of a new robust control method to an automotive active suspension system using skyhook and adaptive active force control (SANAFC) strategy. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8
  9. 9

    Features selection for ids in encrypted traffic using genetic algorithm by Barati, Mehdi, Abdullah, Azizol, Mahmod, Ramlan, Mustapha, Norwati, Udzir, Nur Izura

    Published 2013
    “…This paper presents a hybrid feature selection using Genetic Algorithm and Bayesian Network to improve Brute Force attack detection in Secure Shell (SSH) traffic. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Real time self-calibration algorithm of pressure sensor for robotic hand glove system by Almassri, Ahmed M. M.

    Published 2019
    “…The proposed method was validated by comparing the output force of PSCA with the experimental target force from load cell (reference). …”
    Get full text
    Get full text
    Thesis
  11. 11

    Genetic algorithm based for optimizing filter design / Rohana Awang Ahmed by Awang Ahmed, Rohana

    Published 2000
    “…GA is then implemented using the Genetic Algorithm Toolbox (GAOT). …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…A GUI is created in a form of JAVA application to display data detected from tag. …”
    Get full text
    Get full text
    Thesis
  14. 14

    DSP-based flexible digital hysteresis in switched capacitor active power filter by Rahim, N.A., Radzi, M.A.M.

    Published 2010
    “…By integrating hysteresis current control with digital-based neural network harmonic detection, the proposed SCAPF forces the supply current to be sinusoidal, to have low current harmonics, and to be in phase with the line voltage. …”
    Get full text
    Article
  15. 15

    Efficient and secured compression and steganography technique in wireless sensor network by Tuama, Ammar Yaseen

    Published 2016
    “…Furthermore, some analyses on hiding quality show that our algorithm retains the cover image quality as high as that of standard LSB algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Enhanced Ad Hoc On-Demand Distance Vector Routing Protocol For Mobile Ad Hoc Network Internet Connectivity by Gurusamy, Gobi

    Published 2006
    “…The Internet Engineering Task Force (IEFT) currently has a working group called mobile Ad hoc network (MANET) that is working on routing specification for Ad hoc networks. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Financial time series predicting using machine learning algorithms by Tiong, Leslie Ching Ow *

    Published 2013
    “…Thereafter, Artificial Neural Network (ANN) and Support Vector Machine (SVM) algorithms are implemented separately to train with the trend patterns for predicting the movement direction of financial trends. …”
    Get full text
    Thesis
  18. 18

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…The algorithm is implemented as a plugin. It does not interfere with the web application original code. …”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Multicast-Based Mobile Ipv6 Join/Leave Mechanism Software by A.M. Ali, Sahar

    Published 2003
    “…Hence, IP-multicast provides a scalable infrastructure for efficient, location-independent, packet delivery.The recent advances in wireless communication technology and the growth of the Internet have paved the way for wireless networking and IP mobility. Unlike conventional wired networks, wireless networks possess different channel characteristics and mobility dynamics that render network design and analysis more cha1lenging. …”
    Get full text
    Get full text
    Thesis
  20. 20