Search Results - (( java implication based algorithm ) OR ( programming link between algorithm ))

  • Showing 1 - 20 results of 20
Refine Results
  1. 1
  2. 2

    Hybrid intelligent active force controller for robot arms using evolutionary neural networks by Hussein, S. B., Jamaluddin, H., Mailah, M., Zalzala, A. M. S.

    Published 2000
    “…Hence, the behavioral link between the parent and their offspring can be maintained. …”
    Get full text
    Get full text
    Article
  3. 3

    A hybrid intelligent active force controller for robot arms using evolutionary neural networks by Hussein, S.B, Jamaluddin, H, Mailah, M, Zalzala, A.M.S

    Published 2000
    “…Hence, the behavioral link between the parent and their offspring can be maintained. …”
    Get full text
    Get full text
    Article
  4. 4
  5. 5
  6. 6

    Hazard identification on fractionation column using rule based expert system by Mohd Yunus, Mohd Yusri, Ali, Mohamad Wijayanuddin

    Published 2001
    “…An inference engine mechanism is developed using Visual Basic programming language, for appropriate interaction between these components in order to identify causes and consequences of deviation for each process stream. …”
    Get full text
    Get full text
    Article
  7. 7

    3D solid robot animation design based on ADAMS by Baojian Yang, Yongning Deng, Xia Yue, Tze, Kenneth Kin Teo

    Published 2023
    “…This paper uses the Denavit-Hartenberg rule to construct a biped robot animation simulation kinematics model, deduces a matrix expression describing joint vectors between adjacent links, and solves the biped robot’s positive kinematics equation by chain multiplication rule; An efficient and improved inverse kinematics algorithm is proposed. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  8. 8
  9. 9
  10. 10

    Enhancement Of Clustering Algorithm Using 3D Euclidean Distance To Improve Network Connectivity In Wireless Sensor Networks For Correlated Node Behaviours by Kalid Abdlkader Marsal Salih

    Published 2024
    “…Then, the enhancement clustering algorithm will be constructed based on correlated degree which is selected as a cluster head to serves as a link connectivity between individual node and its neighbor to form network clustering. …”
    thesis::doctoral thesis
  11. 11

    Feedback Control Of Inverted Pendulum Using Raspberry Pi Microcontroller And Arduino UNO by Leslie Kneoh, Yen Sing

    Published 2018
    “…The controlling in inverted pendulum is studied in the Arduino programming with the usage of Raspberry Pi microcontroller. …”
    Get full text
    Get full text
    Monograph
  12. 12
  13. 13

    An innovative approach of blending security features in energy-efficient routing for a crowded network of wireless sensors by Pathan, Al-Sakib Khan, Ahmed, Tarem

    Published 2014
    “…If any intermediate node between any two communicating nodes runs out of battery power, the link between the end nodes is eventually broken. …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  14. 14

    Exploring the impact of social media utilization on perceived information overload: the mediating role of information disorder experiences by Masrek, Mohamad Noorman, Baharuddin, Mohammad Fazli, Heriyanto

    Published 2025
    “…The findings reveal that social media utilization is positively associated with perceived information disorder experience. However, the direct link between social media utilization and information overload was not significant. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Bridging Mayer’s cognitive theory of multimedia learning and computational thinking in tackling the cognitive load issues among young digital natives : a conceptual framework by Wan Nor Ashiqin Wan Ali, Wan Ahmad Jaafar Wan Yahaya

    Published 2022
    “…CT refers to the capacity of learners to systematically tackle unstructured tasks focused on four computing concepts such as decomposition, abstraction, pattern recognition, and algorithmic thinking. The purpose of this paper is to study the relationship between CT and Mayer’s Cognitive Theory of Multimedia Learning (CTML) on the cognitive load of the learners. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Logistics center location-inventory-routing problem optimization: a systematic review using PRISMA method by Liu, Lihua, Lee, Lai Soon, Seow, Hsin Vonn, Chen, Chuei Yee

    Published 2022
    “…When dealing with the LIRP, heuristic and metaheuristic algorithms are the most widely used solution methodologies in the literature. …”
    Get full text
    Get full text
    Article
  17. 17

    Development of adaptive controlled natural gas transmission water bath heater using mathematical model / Amiruddin Amkaromi by Amkaromi, Amiruddin

    Published 2018
    “…Data acquisition is done using USB-6001 links to thermocouples on bath and coil outlet and voltage regulator between the power-supply to the heating element. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Random Amplified Polymorphic DNA Analysis of Four Breeds of Sheep in Malaysia by Vijaya Kumar

    Published 1999
    “…The neighbour-joining and the UPGMA trees based on the Dice's and Jaccard's similarity indices showed little or no consensus on the clustering of the individuals in each population. Genetic distance between populations ranged from 0.1040 to 0.1357 based on the Dice's algorithm while the distance based on the Jaccard's algorithm ranged from 0.1875 to 0.2381. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Progressive damage analysis of woven composite panels subjected to tensile loading by Kamarulazizi, Sulaiman

    Published 2012
    “…In order to achieve this, three types of stress based failure criteria namely Tsai-Wu, Tsai Hill and maximum stress are included in the finite element analysis via user subroutines which is coded in FORTRAN programming language and is then linked with ABAQUS finite element software. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC by Ismail, Haqi Khalid

    Published 2021
    “…A new multi-factor authentication scheme is designed using the AES-ECC algorithm based on Kerberos workflow to establish secure, efficient, and lightweight communication between the user and the targeted IIoT devices to avoid the issues. …”
    Get full text
    Get full text
    Thesis