Search Results - (( java implication based algorithm ) OR ( programming link between algorithm ))
Search alternatives:
- implication based »
- between algorithm »
- java implication »
- programming link »
-
1
-
2
Hybrid intelligent active force controller for robot arms using evolutionary neural networks
Published 2000“…Hence, the behavioral link between the parent and their offspring can be maintained. …”
Get full text
Get full text
Article -
3
A hybrid intelligent active force controller for robot arms using evolutionary neural networks
Published 2000“…Hence, the behavioral link between the parent and their offspring can be maintained. …”
Get full text
Get full text
Article -
4
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
5
-
6
Hazard identification on fractionation column using rule based expert system
Published 2001“…An inference engine mechanism is developed using Visual Basic programming language, for appropriate interaction between these components in order to identify causes and consequences of deviation for each process stream. …”
Get full text
Get full text
Article -
7
3D solid robot animation design based on ADAMS
Published 2023“…This paper uses the Denavit-Hartenberg rule to construct a biped robot animation simulation kinematics model, deduces a matrix expression describing joint vectors between adjacent links, and solves the biped robot’s positive kinematics equation by chain multiplication rule; An efficient and improved inverse kinematics algorithm is proposed. …”
Get full text
Get full text
Get full text
Get full text
Article -
8
Three-point Block Algorithm For Approximating Duffing Type Differential Equations
Published 2024journal::journal article -
9
-
10
Enhancement Of Clustering Algorithm Using 3D Euclidean Distance To Improve Network Connectivity In Wireless Sensor Networks For Correlated Node Behaviours
Published 2024“…Then, the enhancement clustering algorithm will be constructed based on correlated degree which is selected as a cluster head to serves as a link connectivity between individual node and its neighbor to form network clustering. …”
thesis::doctoral thesis -
11
Feedback Control Of Inverted Pendulum Using Raspberry Pi Microcontroller And Arduino UNO
Published 2018“…The controlling in inverted pendulum is studied in the Arduino programming with the usage of Raspberry Pi microcontroller. …”
Get full text
Get full text
Monograph -
12
A platform to develop a secure instant messaging using jabber protocol
Published 2010Get full text
Article -
13
An innovative approach of blending security features in energy-efficient routing for a crowded network of wireless sensors
Published 2014“…If any intermediate node between any two communicating nodes runs out of battery power, the link between the end nodes is eventually broken. …”
Get full text
Get full text
Get full text
Book Chapter -
14
Exploring the impact of social media utilization on perceived information overload: the mediating role of information disorder experiences
Published 2025“…The findings reveal that social media utilization is positively associated with perceived information disorder experience. However, the direct link between social media utilization and information overload was not significant. …”
Get full text
Get full text
Get full text
Article -
15
Bridging Mayer’s cognitive theory of multimedia learning and computational thinking in tackling the cognitive load issues among young digital natives : a conceptual framework
Published 2022“…CT refers to the capacity of learners to systematically tackle unstructured tasks focused on four computing concepts such as decomposition, abstraction, pattern recognition, and algorithmic thinking. The purpose of this paper is to study the relationship between CT and Mayer’s Cognitive Theory of Multimedia Learning (CTML) on the cognitive load of the learners. …”
Get full text
Get full text
Get full text
Article -
16
Logistics center location-inventory-routing problem optimization: a systematic review using PRISMA method
Published 2022“…When dealing with the LIRP, heuristic and metaheuristic algorithms are the most widely used solution methodologies in the literature. …”
Get full text
Get full text
Article -
17
Development of adaptive controlled natural gas transmission water bath heater using mathematical model / Amiruddin Amkaromi
Published 2018“…Data acquisition is done using USB-6001 links to thermocouples on bath and coil outlet and voltage regulator between the power-supply to the heating element. …”
Get full text
Get full text
Thesis -
18
Random Amplified Polymorphic DNA Analysis of Four Breeds of Sheep in Malaysia
Published 1999“…The neighbour-joining and the UPGMA trees based on the Dice's and Jaccard's similarity indices showed little or no consensus on the clustering of the individuals in each population. Genetic distance between populations ranged from 0.1040 to 0.1357 based on the Dice's algorithm while the distance based on the Jaccard's algorithm ranged from 0.1875 to 0.2381. …”
Get full text
Get full text
Thesis -
19
Progressive damage analysis of woven composite panels subjected to tensile loading
Published 2012“…In order to achieve this, three types of stress based failure criteria namely Tsai-Wu, Tsai Hill and maximum stress are included in the finite element analysis via user subroutines which is coded in FORTRAN programming language and is then linked with ABAQUS finite element software. …”
Get full text
Get full text
Thesis -
20
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…A new multi-factor authentication scheme is designed using the AES-ECC algorithm based on Kerberos workflow to establish secure, efficient, and lightweight communication between the user and the targeted IIoT devices to avoid the issues. …”
Get full text
Get full text
Thesis
