Search Results - (( java implementation plan algorithm ) OR ( using computing force algorithm ))
Search alternatives:
- java implementation »
- implementation plan »
- using computing »
- computing force »
- force algorithm »
- plan algorithm »
-
1
A web-based implementation of k-means algorithms
Published 2022“…The project was planned using the Kanban development methodology, and was built using HTML, CSS, JavaScript, Django, NumPy and pandas. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
2
Smart appointment organizer for mobile application / Mohd Syafiq Adam
Published 2009“…The development of this project is based on a framework of 5 main stages: planning, analysis, design, implementation and testing. …”
Get full text
Get full text
Thesis -
3
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This methodology consist of Requirement and Planning, Design, Construction, Testing and Implementation. …”
Get full text
Get full text
Thesis -
4
Optimizing BOINC scheduling using genetic algorithm based on thermal profile
Published 2014“…Main function of BOINC is to use the idle time of computer to run some computation at background. …”
Get full text
Get full text
Conference or Workshop Item -
5
-
6
Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer
Published 2017“…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
Get full text
Get full text
Thesis -
7
Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment
Published 2021“…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
Get full text
Get full text
Get full text
Get full text
Article -
8
Implementation of RIO in UMJaNetSim / Chan Chin We
Published 2004“…In this project, I will do some research on the recent TCP congestion control and avoidance mechanisms and implement one of the mechanisms into the Java Network Simulator (JaNetSim). …”
Get full text
Get full text
Thesis -
9
Songs Search Using Human Humming Voice
Published 2007“…The scopes for this project are human humming voice, voice capture in WA V format, songs database, and MIDI file comparing algorithm. Methodologies used in this system are based on system analysis and design methodology comprising planning, analysis, design and implementation. …”
Get full text
Get full text
Final Year Project -
10
-
11
Cryptanalysis in cryptographic algorithm design
Published 2006Get full text
Conference or Workshop Item -
12
Intelligent active force control of a robotic arm using genetic algorithm
Published 2002“…The results show that the GA used in the study being a stochastic and global optimizer successfully computes appropriate IN value to effect the control action. …”
Get full text
Get full text
Get full text
Article -
13
Virtual force field algorithm for a behaviour-based autonomous robot in unknown environments
Published 2011“…The present paper describes a real-time motion-planning approach which lies in the integration of three techniques: fuzzy logic (FL), virtual force field (VFF), and boundary following (BF). The FL algorithm is used for velocity control based on sonar readings. …”
Get full text
Get full text
Get full text
Article -
14
A real-time algorithm of optical tactile sensor for surface characterization / Nurul Fathiah Mohamed Rosli
Published 2016“…The overall image analysis technique involves the following algorithms: image acquisition (capturing of images), processing (thresholding, noise filtering and boundary detection) and recognition (force measurement). …”
Get full text
Get full text
Thesis -
15
HAPTIC VISUALIZATION USING VISUAL TEXTURE INFORMATION
Published 2011Get full text
Get full text
Thesis -
16
Optimal loading analysis with penalty factors for generators using brute force method
Published 2022“…This paper reports the optimal loading analysis method using the Brute Force method with and without considering the penalty factor of power line loss. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Active Suspension System for Passenger Vehicle using Active Force Control with Iterative Learning Algorithm
Published 2014“…The overall control system essentially comprises three feedback control loops to cater for a number of specific tasks; the innermost loop for the force tracking of the pneumatic actuator using a PI controller, the intermediate loops implementing AFC with IL algorithm strategy for the compensation of the disturbances, and the outermost loop using a PID controller for the computation of the desired force. …”
Get full text
Get full text
Get full text
Article -
18
Features selection for IDS in encrypted traffic using genetic algorithm
Published 2013“…This paper presents a hybrid feature selection using Genetic Algorithm and Bayesian Network to improve Brute Force attack detection in Secure Shell (SSH) traffic.Brute Force attack traffic collected in a client-server model is implemented in proposed method.Our results prove that the most efficient features were selected by proposed method.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Improved abnormal detection using self-adaptive social force model for visual surveillance
Published 2017“…In this work, we aim to find the significant interaction forces and detect the abnormality in the crowd by using Self-Adaptive Social Force Model. …”
Get full text
Get full text
Thesis -
20
Discretization of crack propagation on parallel computing : complexity and parallel algorithms with source code
Published 2010“…The element stiffness matrix which had been set up earlier can be used to describe the elastic deformation since the numerical FEM is emphasized as a platform for discretization of one-dimensional continua problems where the stress is uniaxial and implemented on parallel algorithm using the distributed parallel computer system. …”
Get full text
Get full text
Get full text
Book Section
