Search Results - (( java implementation bat algorithm ) OR ( user computing force algorithm ))

Refine Results
  1. 1

    Fuzzy modeling using Bat Algorithm optimization for classification by Noor Amidah, Ahmad Sultan

    Published 2018
    “…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  2. 2

    HAPTIC VISUALIZATION USING VISUAL TEXTURE INFORMATION by Adi, Waskito

    Published 2011
    “…In the query process, accuracy is determined by the number of feature vector elements, data extraction, and similarity measurement algorithm. A user testing to validate the framework shows that users’ perception of haptic feedback differs depending on the different type of rendering algorithm. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Features selection for IDS in encrypted traffic using genetic algorithm by Barati, Mehdi, Abdullah, Azizol, Mahmod, Ramlan, Mustapha, Norwati, Udzir, Nur Izura

    Published 2013
    “…Intrusion Detection System (IDS) is one method to detect unauthorized intrusions into computer systems and networks. On the other hand, encrypted exchanges between users are widely used to ensure data security. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4
  5. 5

    A new algorithm on Graphical User Authentication (GUA) based on multi-line grids by Lashkari, Arash Habibi, Gani, Abdullah, Sabet, Leila Ghasemi, Farmand, Samaneh

    Published 2010
    “…But committing to memory such strong passwords can prove to be quite a daunting task thus forcing users to resort to writing them down on pieces of papers or even storing them onto a computer file. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6
  7. 7

    Features selection for ids in encrypted traffic using genetic algorithm by Barati, Mehdi, Abdullah, Azizol, Mahmod, Ramlan, Mustapha, Norwati, Udzir, Nur Izura

    Published 2013
    “…This paper presents a hybrid feature selection using Genetic Algorithm and Bayesian Network to improve Brute Force attack detection in Secure Shell (SSH) traffic. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8
  9. 9
  10. 10

    Development of a software for simulating active force control schemes of a two-link planar manipulator by Mailah, Musa, Poh, Yang Liang

    Published 2005
    “…The Paper Describes The Development Of A Software In The Form Of An Interactive Computer Program That Integrates A Number Of Robotic Control Schemes With The Active Force Control (Afc) Strategy As The Key Element Of The Robotic System That Assumes A Rigid Two-Link Planar Configuration. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    Enhancing cloud data security using hybrid of advanced encryption standard and Blowfish encryption algorithms by -, Salma, Olanrewaju, Rashidah Funke, Abdullah, Khaizuran, -, Rusmala, Darwis, Herdianti

    Published 2019
    “…Cloud computing is an IT model that offers a large number of storage space, unbelievable computing power and inconceivable speed of calculations. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  13. 13

    Reduced Rank Technique for Joint Channel Estimation and Joint Data Detection in TD-SCDMA Systems by Sabira, Khatun, Ali K., Marzook, Alyani, Ismail, Aduwati, Sali, Mohannad Hamed, Khalaf, Borhan, M. Ali

    Published 2012
    “…The detectors: zero forcing block linear equalizer and minimum mean square error block linear equalizer algorithms are considered in this paper to recover the data. …”
    Get full text
    Get full text
    Article
  14. 14

    Development of a software for simulating active force control schemes of a two–link planar manipulator by Mailah, Musa, Poh, Yang Liang

    Published 2005
    “…The paper describes the development of a software in the form of an interactive computer program that integrates a number of robotic control schemes with the active force control (AFC) strategy as the key element of the robotic system that assumes a rigid two–link planar configuration. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Analysis and simulation of catamaran mini houseboat design by using Computational Fluid Dynamic (CFD) / Muhammad Danish Irfan Mohd Aihsan by Mohd Aihsan, Muhammad Danish Irfan

    Published 2024
    “…The objective in this research is Computational Fluid Dynamics (CFD) simulation is to analyse fluid flow around the hull of the mini houseboat design and analyse the velocity, drag force, air resistance and water resistance to improve the performance of the design. …”
    Get full text
    Get full text
    Student Project
  16. 16
  17. 17
  18. 18

    Multi-user beamforming, fairness and device-to-device channel state information sharing in downlink non-orthogonal multiple access systems by Abdulhussein, Mohanad Mohammed

    Published 2021
    “…To this end, a fair user clustering algorithm with two stages is proposed, wherein the strong and weak users are selected in the first and second stages, respectively. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Modular motor driver with torque control for gripping mechanism by How D.N.T., Baharuddin M.Z., Mohideen S.S.K., Sahari K.S.M., Anuar A.

    Published 2023
    “…In implementing the project, several algorithms were tested to achieve the torque control algorithm requirement including on-off algorithm, P algorithm, PI algorithm, PD algorithm and PID algorithm. …”
    Conference paper
  20. 20

    Real time self-calibration algorithm of pressure sensor for robotic hand glove system by Almassri, Ahmed M. M.

    Published 2019
    “…The proposed method was validated by comparing the output force of PSCA with the experimental target force from load cell (reference). …”
    Get full text
    Get full text
    Thesis