Search Results - (( java implementation graph algorithm ) OR ( program detection force algorithm ))

  • Showing 1 - 8 results of 8
Refine Results
  1. 1

    Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter by Azhar, Nur Huwaina

    Published 2019
    “…In the benchmark paper, the result of implementation of LACE algorithm in 400, 600, 800 and 1000 servers were plotted at different graphs. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Priority and dynamic quantum time algorithms for central processing unit scheduling by Mohammed, Maysoon A.

    Published 2018
    “…The proposed algorithms (Priority Dynamic Quantum Time and Multi Priority Dynamic Quantum Time Algorithms) are implemented using JAVA programming language and validated using Key Performance Indicators equations. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Speed-up robust features based 3D object recognition for grasping by three fingered robot hand / Nurul Hanani Remeli by Remeli, Nurul Hanani

    Published 2018
    “…Meanwhile, the strength of the gripping force is measured by comparing the result of motor position angle with the voltage from a force sensor attached at each of the robot finger tips. …”
    Get full text
    Get full text
    Thesis
  5. 5

    A review of classification techniques for electromyography signals by Mohd Saad, Norhashimah, Omar, Siti Nashayu, Abdullah, Abdul Rahim, Shair, Ezreen Farina, H.Rashid

    Published 2023
    “…Electromyography (EMG) signals can be used in various sector such as medical, rehabilitation, robotics, and industrial fields.EMG measures muscle response or electrical activity in response to a nerve’s stimulation of the muscle. To detect neuromuscular abnormalities, these test is very useful.EMG can measures the electrical activity of muscle during rest, slight and forceful contraction. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Multistage quality control in manufacturing process using blockchain with machine learning technique by Gu, J., Zhao, L., Yue, X., Arshad, N.I., Mohamad, U.H.

    Published 2023
    “…BCT allows collecting sensor user access data, whereas ML classifiers distinguish between normal and malicious behavior to detect attacks. DoS, DDoS, intrusion, a man in the middle (MitM), brute force, cross-site scripting (XSS), and searching are the attacks detected by BCT. …”
    Get full text
    Get full text
    Article
  7. 7

    Evolutionary cost-cognizant regression test case prioritization for object-oriented programs by Bello, AbdulKarim

    Published 2019
    “…Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
    Get full text
    Get full text
    Thesis
  8. 8