Search Results - (( java implementation bees algorithm ) OR ( user computing force algorithm ))
Search alternatives:
- java implementation »
- implementation bees »
- computing force »
- force algorithm »
- bees algorithm »
- user computing »
-
1
HAPTIC VISUALIZATION USING VISUAL TEXTURE INFORMATION
Published 2011“…In the query process, accuracy is determined by the number of feature vector elements, data extraction, and similarity measurement algorithm. A user testing to validate the framework shows that users’ perception of haptic feedback differs depending on the different type of rendering algorithm. …”
Get full text
Get full text
Thesis -
2
Features selection for IDS in encrypted traffic using genetic algorithm
Published 2013“…Intrusion Detection System (IDS) is one method to detect unauthorized intrusions into computer systems and networks. On the other hand, encrypted exchanges between users are widely used to ensure data security. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Securing password authentication using MD5 algorithm
Published 2014Get full text
Get full text
Undergraduates Project Papers -
4
A new algorithm on Graphical User Authentication (GUA) based on multi-line grids
Published 2010“…But committing to memory such strong passwords can prove to be quite a daunting task thus forcing users to resort to writing them down on pieces of papers or even storing them onto a computer file. …”
Get full text
Get full text
Get full text
Article -
5
Gps solution for active queue management using android platform
Published 2021Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Features selection for ids in encrypted traffic using genetic algorithm
Published 2013“…This paper presents a hybrid feature selection using Genetic Algorithm and Bayesian Network to improve Brute Force attack detection in Secure Shell (SSH) traffic. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
-
8
-
9
Development of a software for simulating active force control schemes of a two-link planar manipulator
Published 2005“…The Paper Describes The Development Of A Software In The Form Of An Interactive Computer Program That Integrates A Number Of Robotic Control Schemes With The Active Force Control (Afc) Strategy As The Key Element Of The Robotic System That Assumes A Rigid Two-Link Planar Configuration. …”
Get full text
Get full text
Get full text
Article -
10
-
11
Enhancing cloud data security using hybrid of advanced encryption standard and Blowfish encryption algorithms
Published 2019“…Cloud computing is an IT model that offers a large number of storage space, unbelievable computing power and inconceivable speed of calculations. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
12
Reduced Rank Technique for Joint Channel Estimation and Joint Data Detection in TD-SCDMA Systems
Published 2012“…The detectors: zero forcing block linear equalizer and minimum mean square error block linear equalizer algorithms are considered in this paper to recover the data. …”
Get full text
Get full text
Article -
13
Development of a software for simulating active force control schemes of a two–link planar manipulator
Published 2005“…The paper describes the development of a software in the form of an interactive computer program that integrates a number of robotic control schemes with the active force control (AFC) strategy as the key element of the robotic system that assumes a rigid two–link planar configuration. …”
Get full text
Get full text
Get full text
Article -
14
Analysis and simulation of catamaran mini houseboat design by using Computational Fluid Dynamic (CFD) / Muhammad Danish Irfan Mohd Aihsan
Published 2024“…The objective in this research is Computational Fluid Dynamics (CFD) simulation is to analyse fluid flow around the hull of the mini houseboat design and analyse the velocity, drag force, air resistance and water resistance to improve the performance of the design. …”
Get full text
Get full text
Student Project -
15
Two-Phases QR Authentication Algorithm (2PQRA) for Digital Energy and IoT Applications
Published 2023Conference Paper -
16
-
17
Multi-user beamforming, fairness and device-to-device channel state information sharing in downlink non-orthogonal multiple access systems
Published 2021“…To this end, a fair user clustering algorithm with two stages is proposed, wherein the strong and weak users are selected in the first and second stages, respectively. …”
Get full text
Get full text
Thesis -
18
Modular motor driver with torque control for gripping mechanism
Published 2023“…In implementing the project, several algorithms were tested to achieve the torque control algorithm requirement including on-off algorithm, P algorithm, PI algorithm, PD algorithm and PID algorithm. …”
Conference paper -
19
Real time self-calibration algorithm of pressure sensor for robotic hand glove system
Published 2019“…The proposed method was validated by comparing the output force of PSCA with the experimental target force from load cell (reference). …”
Get full text
Get full text
Thesis -
20
Reduced-rank technique for joint channel estimation in TD-SCDMA systems.
Published 2013“…The detectors: zero forcing block linear equalizer and minimum mean square error block linear equalizer algorithms are considered in this paper to recover the data. …”
Get full text
Get full text
Article
