Search Results - (( java implication based algorithm ) OR ( after implementation force algorithm ))
Search alternatives:
- after implementation »
- implementation force »
- implication based »
- java implication »
- force algorithm »
-
1
Node placement optimization using extended virtual force and cuckoo search algorithm in wireless sensor network
Published 2014“…This study proposed Extended Virtual Force and Cuckoo Search (EVFCS) algorithm with a combination of EVFA and CS algorithm to find an optimal node placement. …”
Get full text
Get full text
Get full text
Thesis -
2
A new algorithm to identify nonlinear vibration of car body in white (BIW) structure
Published 2013Get full text
Get full text
Research Book Profile -
3
An intelligent method to estimate the inertia matrix of a robot arm for active force control using on-line neural network training scheme
Published 1999“…The robot under study is a planar two-link rigid robot which is subjected to a non-linear disturbance torques acting at the robot joints. The algorithm has two stages, namely the ANN training stage and the implementation stage. …”
Get full text
Get full text
Get full text
Article -
4
-
5
SENSORY EXPERT: DEVICE FOR SENSORY TEST
Published 2018“…The study is divided into three stages which are developing heating element stage, developing algorithm for heat sensing stage and developing algorithm for data transmitting stage. …”
Get full text
Get full text
Final Year Project -
6
Transcultural diabetes nutrition algorithm : a Malaysian application
Published 2013“…However, Asian patients with T2D, including Malaysians, have unique disease characteristics and risk factors, as well as cultural and lifestyle dissimilarities, which may render international guidelines and recommendations less applicable and/or difficult to implement. With these thoughts in mind, a transcultural Diabetes Nutrition Algorithm (tDNA) was developed by an international task force of diabetes and nutrition experts through the restructuring of international guidelines for the nutritional management of prediabetes and T2D to account for cultural differences in lifestyle, diet, and genetic factors. …”
Get full text
Get full text
Get full text
Article -
7
Gripping controller design for a one-degree-of-freedom robotic hand model based on slip detection
Published 2016“…Measuring the grasping force between the robotic hand and an object can be achieved by using Force-Sensing Resistor (FSR), which have been widely used in robotics applications. …”
Get full text
Get full text
Thesis -
8
Force and impedance control for hydraulically driven hexapod robot walking on uneven terrain
Published 2012“…The instability of using the ETT module alone and with proposed hybrid force/position control in the previous progress, during body patching on walking session is then solved using the proposed pull-back position-based force control (PPF). …”
Get full text
Get full text
Thesis -
9
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
10
-
11
Fuzzy-pid controller design for brake-by-wire system of electrical vehicle
Published 2014“…In view of that, the mechanism behavior and operating process of both brake systems are dominated by implementing distinct control algorithms based on PID and Fuzzy-PID controllers. …”
Get full text
Get full text
Thesis -
12
Form Finding And Shape Change Analysis Of Spine Inspired Bio-Tensegrity Model
Published 2017“…The shape change of SBS models towards target state is achieved by means of forced elongation of cable. Computational strategies for the shape change consist of two stages: the derivation of incremental equilibrium equations and optimization of the cables forced elongation by sequential quadratic programming. …”
Get full text
Get full text
Thesis -
13
Development of optimized damage prediction method for health monitoring of ultra high performance fiber-reinforced concrete communication tower
Published 2018“…Therefore, this study aims to develop a new health monitoring system for communication towers based on AdaBoost, Bagging, and RUSBoost algorithms as hybrid algorithm, which can predict the damage by using noisy, random, unstable, and skewed frequency data with high accuracy. …”
Get full text
Get full text
Thesis -
14
RaspyAir: self-monitoring system for wireless intrusion detection using raspberry pi / Mohd Nizam Osman and Mohd Syafiq Aiman Mohamad Zulrahim
Published 2016“…The brute-force algorithm is used to filter the traffic using signature based detection technique. …”
Get full text
Get full text
Get full text
Article -
15
The development of secure interface system for wi-fi internet access using blended approach of captive portals and key verification techniques / Kamarul Ariffin Abdul Basit … [et a...
Published 2014“…However, the current implementation of Wi-Fi does not offer enough security protection. …”
Get full text
Get full text
Get full text
Book Section -
16
Secure multi-authority attribute-based encryption access control with cache-aware scheduling in mobile cloud computing
Published 2021“…Although the key generator is distributed among the authority nodes, the decision to generate user credential is based on a single decision. An adversary can force the authority to produce false private keys that can tarnish the integrity of the ABE system. …”
Get full text
Get full text
Thesis
