Search Results - (( java information needs algorithm ) OR ( program implementation force algorithm ))
Search alternatives:
- program implementation »
- implementation force »
- java information »
- needs algorithm »
- force algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
Genetic algorithm based for optimizing filter design / Rohana Awang Ahmed
Published 2000“…The conventional filter design technique is adapted in writing a MATLAB program using the Signal Processing Toolbox. GA is then implemented using the Genetic Algorithm Toolbox (GAOT). …”
Get full text
Get full text
Thesis -
3
Text messaging encryption system
Published 2012“…Text Messaging Encryption system is a text message encryption and decryption.Encryption is a process of masking a message so that it is unreadable.Encryption is important to avoid other people to read certain information. The only way to read the information is to know the method on how message is being masked,in this case knowing the algorithm used to encrypt the message. …”
Get full text
Get full text
Undergraduates Project Papers -
4
Hybrid cryptography algorithm to improve security cloud storage
Published 2017“…Utilization of a solitary algorithm is not powerful for extra ordinary state security to information in cloud computing. …”
Get full text
Get full text
Get full text
Thesis -
5
Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli
Published 2019“…Advanced Encryption Standard algorithm is being used to encrypt the text messaging. …”
Get full text
Get full text
Student Project -
6
Modular motor driver with torque control for gripping mechanism
Published 2023“…This is possible by taking in the magnitude of the current drawn by the load as the feedback to the system and set appropriate action to protect the system from damage when a certain setpoint of current is reached. In implementing the project, several algorithms were tested to achieve the torque control algorithm requirement including on-off algorithm, P algorithm, PI algorithm, PD algorithm and PID algorithm. …”
Conference paper -
7
Biometric identification with limited data set
Published 2019Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
8
Movie recommendation system / Najwa Syamimie Hasnu
Published 2020“…PHPMyAdmin is used to store the dataset and also acts as a database for user information. The algorithm chosen was implemented using Java Programming language and was tested using Root Means Square Error (RMSE) formula.…”
Get full text
Get full text
Thesis -
9
Mapreduce algorithm for weather dataset
Published 2017“…This original dataset is stored in Hadoop Distributed File System. Next, MapReduce Algorithm is developed using Java programming. The algorithm is tested using small and big dataset. …”
Get full text
Get full text
Thesis -
10
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The support vector machines (SVM) algorithm obtained the overall best results of 94.5% accuracy, 91.8% precision, 91.7% recall, and 91.1% f-Measure while the naïve bayes (NB) algorithm obtained the best AUC score of 0.944 with the tweet data of Dato Seri Anwar. …”
Get full text
Get full text
Get full text
Thesis -
11
Two-axis position-based impedance control of a 2-DOF robotic finger / Khairunnisa Nasir
Published 2017“…The positionbased impedance control algorithm was designed by regulating the mechanical impedance of the robotic finger based on force measurements from the two embedded force sensors. …”
Get full text
Get full text
Thesis -
12
-
13
MapReduce algorithm for weather dataset
Published 2018“…This original dataset is stored in Hadoop Distributed File System. Next, MapReduce Algorithm is developed using Java programming. The algorithm is tested using small and big dataset. …”
Get full text
Get full text
Research Report -
14
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…An attacker can easily reconstruct source code from such intermediate formats to extract sensitive information such as proprietary algorithms present in the software. …”
Get full text
Get full text
Thesis -
15
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…The population increases rapidly and many parking bays are needed, especially during weekends when shopping malls face heavy traffic congestion. …”
Get full text
Get full text
Thesis -
16
-
17
Numerical simulation of hybrid composite tubes under oblique compression
Published 2017“…A proper contact algorithm is implemented to prevent interpenetration among elements and surfaces. …”
Get full text
Get full text
Get full text
Article -
18
-
19
-
20
Adaptive constitutive analytical model code for rubber bearings with load-dependent variable analytical model in seismically isolated steel structures
Published 2026“…Thereafter, a dedicated computational algorithm and macro program were developed and implemented within a finite-element software environment to enable real-time adjustment of the lateral stiffness and damping properties of rubber bearings at each time step based on instantaneous vertical reaction forces. …”
Get full text
Get full text
Get full text
Article
