Search Results - (( java implementation change algorithm ) OR ( basic implementation force algorithm ))

Refine Results
  1. 1

    Integrating fuzzy logic and brute force algorithm in optimizing energy management systems for battery electric vehicles by Abulifa, Abdulhadi Abdulsalam, Che Soh, Azura, Hassan, Mohd Khair, Raja Kamil, Mohd Radzi, Mohd Amran

    Published 2023
    “…This research proposes a solution to achieve more efficient control of HVAC consumption by integrating fuzzy logic techniques with brute-force algorithms to optimize the Energy Management System (EMS) in BEVs. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Integrating fuzzy logic and brute force algorithm in optimizing Energy Management Systems for Battery Electric Vehicles by Abdulsalam Abulifa, Abdulhadi, Che Soh, Azura, Hassan, Mohd Khair, Kamil, Raja, Mohd Radzi, Mohd Amran

    Published 2024
    “…This research proposes a solution to achieve more efficient control of HVAC consumption by integrating fuzzy logic techniques with brute-force algorithms to optimize the Energy Management System (EMS) in BEVs. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…The algorithm is implemented as a plugin. It does not interfere with the web application original code. …”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    An Educational Tool Aimed at Learning Metaheuristics by Kader, Md. Abdul, Jamaluddin, Jamal A., Kamal Z., Zamli

    Published 2020
    “…This tool can be an educational assistant for beginners to learn metaheuristic in theoretical lectures as well as practical sessions. Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5
  6. 6

    Data Hiding Techniques In Digital Images by Al Thloothi, Salah Ramadan

    Published 2003
    “…After all these studies, one of the algorithms in the masking technique is developed and implemented using JAVA program to embed message into true color image with a good quality and higher capacity. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography by Naji, Ahmed Wathik, Zaidan, B.B., Hameed, Shihab A., O-Khalifa, Othman

    Published 2009
    “…The aim of this paper is implementation of system computation between Cryptography and Steganography which embeds information in unused area 2 within EXE files to find a secure solution to cover file without change the size of cover file. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8
  9. 9

    Development of control algorithm for a new 12s-6p single phase field excited flux switching motor by Amin, Faisal

    Published 2020
    “…For position detection, algorithms merely need a basic infrared transceiver sensor. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  11. 11
  12. 12

    POISSON EQUATION FOR ELECTROSTATIC FIELD USING THE FINITE DIFFERENCE METHOD by IFFAH FATHANAH, AHMAD RAZALI

    Published 2019
    “…It is a useful approach to the calculation to relate the charge density by the divergence relationship. The basic main equations are derived directly so that the algorithm can be extended from the classical Poisson equation to the generalized Poisson equation in order to include the effects of varying dielectrics within the domain. …”
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  13. 13

    Optimization and prediction of battery electric vehicle driving range using adaptive fuzzy technique by Abulifa, Abdulhadi Abdulsalam

    Published 2022
    “…The work in this thesis is expected to be the best approach in formulating an adaptive fuzzy technique based on brute force and regression algorithms for optimization and prediction of EMS in BEV application.…”
    Get full text
    Get full text
    Thesis
  14. 14

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Efficient beamforming and spectral efficiency maximization in a joint transmission LTE-A system by Faisal, Ali Raed

    Published 2016
    “…Moreover, addressing the lack-of-diversity issue in Basic Particle Swarm Optimization Algorithm (BPSOA) is a primary concern of this work. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Controlling An-Inverted Pendulum System Using A Microcontroller by Mohamad Zahari, Ahmad Amirul

    Published 2022
    “…Particularly during movement, a well-implemented TWSB robot is able to maintain an upright stance. …”
    Get full text
    Get full text
    Monograph
  17. 17

    Form Finding And Shape Change Analysis Of Spine Inspired Bio-Tensegrity Model by Oh, Chai Lian

    Published 2017
    “…The shape change of SBS models towards target state is achieved by means of forced elongation of cable. Computational strategies for the shape change consist of two stages: the derivation of incremental equilibrium equations and optimization of the cables forced elongation by sequential quadratic programming. …”
    Get full text
    Get full text
    Thesis
  18. 18

    An overview on real-time control schemes for wheeled mobile robot by M. S. A., Radzak, Ali, Mohammed A. H., S., Sha'amri, A. R., Azwan

    Published 2018
    “…Four main categories for wheeled mobile robot control systems have been found in literature which are namely: Kinematic based controller, Dynamic based controllers, artificial intelligence based control system, and Active Force control. A MATLAB/Simulink software is the main software to simulate and implement the control system. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Challenges of hidden data in the unused area two within executable files by Naji, Ahmed Wathik, Zaidan, A.A., Zaidan, B.B.

    Published 2009
    “…Results: The programs were coded in Java computer language and implemented on Pentium PC. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Evolutionary cost-cognizant regression test case prioritization for object-oriented programs by Bello, AbdulKarim

    Published 2019
    “…TCS attempts to identify test cases that have the same relevance to some set of changes. This technique has the problem of selecting a significant number of test cases even for small changes made to a software. …”
    Get full text
    Get full text
    Thesis