Search Results - (( java implementation phase algorithm ) OR ( program detection force algorithm ))
Search alternatives:
- implementation phase »
- java implementation »
- program detection »
- phase algorithm »
- detection force »
- force algorithm »
-
1
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…All the algorithm for the engine has been developed by using Java script language. …”
Get full text
Get full text
Thesis -
2
-
3
Optimal route checking using genetic algorithm for UiTM's bus services / Tengku Salman Fathi Tengku Jaafar
Published 2006“…Although from human logical thinking, the route can be generated easily but the calculation of checking the route whether it is optimal route or not is difficult and will take long time to be implemented. This research study with the development of the Optimal Route Checking Using Genetic Algorithm system should solve this scenario. …”
Get full text
Get full text
Thesis -
4
Speed-up robust features based 3D object recognition for grasping by three fingered robot hand / Nurul Hanani Remeli
Published 2018“…Meanwhile, the strength of the gripping force is measured by comparing the result of motor position angle with the voltage from a force sensor attached at each of the robot finger tips. …”
Get full text
Get full text
Thesis -
5
A review of classification techniques for electromyography signals
Published 2023“…Electromyography (EMG) signals can be used in various sector such as medical, rehabilitation, robotics, and industrial fields.EMG measures muscle response or electrical activity in response to a nerve’s stimulation of the muscle. To detect neuromuscular abnormalities, these test is very useful.EMG can measures the electrical activity of muscle during rest, slight and forceful contraction. …”
Get full text
Get full text
Get full text
Article -
6
Multistage quality control in manufacturing process using blockchain with machine learning technique
Published 2023“…BCT allows collecting sensor user access data, whereas ML classifiers distinguish between normal and malicious behavior to detect attacks. DoS, DDoS, intrusion, a man in the middle (MitM), brute force, cross-site scripting (XSS), and searching are the attacks detected by BCT. …”
Get full text
Get full text
Article -
7
