Search Results - (( java solution machine algorithm ) OR ( its implementation using algorithm ))

Refine Results
  1. 1

    Development of open platform controller for step-NC compliant CNC system by Chi Adam, Mohd Khairil Anbia

    Published 2020
    “…Therefore, this study covers the system which has been designed and developed from outdated and conventional PROLIGHT 1000 Milling CNC machine from Light Intelitek as the lesser cost solution which further discussed in detail based upon upgrades of hardware, architecture, and algorithm design. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3
  4. 4

    Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC by Ismail, Haqi Khalid

    Published 2021
    “…A new multi-factor authentication scheme is designed using the AES-ECC algorithm based on Kerberos workflow to establish secure, efficient, and lightweight communication between the user and the targeted IIoT devices to avoid the issues. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    Network monopoly / Tan Kean Yeap by Tan , Kean Yeap

    Published 2002
    “…With the powerful networking features of Java, it is expected that this project would produce a "real" game engine. …”
    Get full text
    Get full text
    Thesis
  7. 7

    A-star (A*) algorithm implementation for robotics path planning navigation by Emirul Ridzwan, Nor Azmi

    Published 2018
    “…This thesis is about the implementation of Astar (A*) algorithm as path planning algorithm used in robotics navigation. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  8. 8

    Computation Enhancement using Reconfigurable Computing by Salim Gumaa, Ayman Hassan

    Published 2015
    “…The chosen algorithm is Fourier Fast Transform due to its part in many DSP applications and its suitability for the project objective. …”
    Get full text
    Get full text
    Final Year Project
  9. 9

    Implementation of repetitive control algorithm in reducing vibration using MATLAB/SIMULINK / Mohamad Zuhairy Mohamed by Mohamed, Mohamad Zuhairy

    Published 2008
    “…In this report, it analyzes an application of repetitive control algorithm that deal with periodic disturbance.. To investigates the possibility of using a truncated finite impulse response (FIR) model approximation to implement a well-known gradient type repetitive control algorithm. …”
    Get full text
    Get full text
    Student Project
  10. 10
  11. 11

    The implications for ahybrid detection technique against malicious sqlattacks on web applications by Bahjat Arif, Sarajaldeen Akram, Wani, Sharyar

    Published 2025
    “…The outcome of this study will add to the body of knowledge the most important and recent proposed solutions to mitigate SQL injection attack, in particular those based on machine learning algorithm…”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Autonomous path planning robot using geographical information by Ismail Ishaq Ibrahim

    Published 2008
    “…After the simulation using Matlab, the algorithm will then be implemented in the robot using basic stamp to run the mobile robot. …”
    Get full text
    Learning Object
  13. 13

    Design and implementation of cordic algorithm with sinusoidal pulse width modulation switching strategy by Madzzaini, Nur Sofea Eleena

    Published 2017
    “…The SPWM controller will be implemented in VLSI ASIC flow. Coordinate Rotation, Digital Computer (CORDIC), known as Volders Algorithm based on its inventor, is an algorithm that is applied to perform trigonometric related computations. …”
    Get full text
    Get full text
    Student Project
  14. 14
  15. 15

    DC Motor Controller Using Linear Quadratic Regulator (LQR) Algorithm Implementation on PIC by Mohd Isa, Nur Iznie Afrah

    Published 2008
    “…In this project, the LQR algorithm was implemented on the PIC microcontroller so the result can be shown. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  16. 16

    Implementation and Evaluation of Large Rsa Encryption and Decryption Keys For Internet Security by H. Belgassem, Seddeq

    Published 2004
    “…Performance has always been the most critical characteristic of a cryptographic algorithm, which determines its effectiveness. In this research the most popular and used algorithm, which is RSA, is implemented with a new modification in order to reduce the calculation time of the algorithm. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Training functional link neural network with ant lion optimizer by Mohmad Hassim, Yana Mazwin, Ghazali, Rozaida

    Published 2020
    “…This paper proposed the implementation of Ant Lion Algorithm as learning algorithm to train the FLNN for classification tasks. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    OPTIMIZED ARCHITECTURE DESIGN AND IMPLEMENTATION OF OBJECT TRACKING ALGORITHM ON FPGA by ABDELFATAH EL-KHATIB, LINA NOAMAN

    Published 2013
    “…The Adaptive Hybrid Difference algorithm (AHD), which is used to detect the moving objects, was chosen to be implemented on FPGA due to its computation ability and efficiency with regard to hardware implementation. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Indoor navigation system using Dijkstra's algorithm for emergency situation / Mohd Faizulhayad Mashuri by Mashuri, Mohd Faizulhayad

    Published 2015
    “…Bigger obstacles will gives higher value of weight. Dijkstra's algorithm can provide shortest route to be used by user in a fast manner due to its medium algorithm complexity compared to the other two (2) algorithms. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Implementation of hybrid encryption method using caesar cipher algorithm by Tat Wi, Charomie

    Published 2010
    “…The result from this project is a data which is encrypted and be decrypted to its readable form. As a conclusion, Caesar cipher algorithm can be implemented in hybrid encryption project to make data secure and better.…”
    Get full text
    Get full text
    Undergraduates Project Papers