Search Results - (( java solution machine algorithm ) OR ( program implementation conversion algorithm ))
Search alternatives:
- implementation conversion »
- program implementation »
- conversion algorithm »
- machine algorithm »
- java solution »
-
1
Computer Lab Timetabling Using Genetic Algorithm Case Study - Unit ICT
Published 2006Get full text
Get full text
Thesis -
2
Examination timetabling using genetic algorithm case study: KUiTTHO
Published 2005Get full text
Get full text
Thesis -
3
-
4
Network monopoly / Tan Kean Yeap
Published 2002“…With the powerful networking features of Java, it is expected that this project would produce a "real" game engine. …”
Get full text
Get full text
Thesis -
5
Parallel distributed genetic algorithm development based on microcontrollers framework
Published 2023Conference paper -
6
Development of open platform controller for step-NC compliant CNC system
Published 2020“…Therefore, this study covers the system which has been designed and developed from outdated and conventional PROLIGHT 1000 Milling CNC machine from Light Intelitek as the lesser cost solution which further discussed in detail based upon upgrades of hardware, architecture, and algorithm design. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Modular motor driver with torque control for gripping mechanism
Published 2023“…This is possible by taking in the magnitude of the current drawn by the load as the feedback to the system and set appropriate action to protect the system from damage when a certain setpoint of current is reached. In implementing the project, several algorithms were tested to achieve the torque control algorithm requirement including on-off algorithm, P algorithm, PI algorithm, PD algorithm and PID algorithm. …”
Conference paper -
8
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…The outcome of this study will add to the body of knowledge the most important and recent proposed solutions to mitigate SQL injection attack, in particular those based on machine learning algorithm…”
Get full text
Get full text
Get full text
Article -
9
Development of Path Loss Models for Smooth and Convex Surfaces Terrains in Malaysian Environment
Published 2004“…This program consists of four algorithms which are conversion formulas, smooth terrain, single convex surface terrain and double convex surfaces terrain.…”
Get full text
Get full text
Thesis -
10
Implementing a novel hybrid maximum power point tracking technique in DSP via Simulink/MATLAB under partially shaded conditions
Published 2016“…The simulation and experimental implementations for the proposed algorithm are performed with different scenarios of shadowing under different irradiations, which clearly indicate that the proposed method is robust and has a fast tracking speed. …”
Get full text
Get full text
Get full text
Article -
11
Comparative Analysis of Cervical Cell Classification Using Machine Learning Algorithms
Published 2026journal::journal article -
12
A platform to develop a secure instant messaging using jabber protocol
Published 2010Get full text
Article -
13
Use of hybrid classification algorithm for land use and land cover analysis in data scarce environment
Published 2013“…In this study, vegetation indices, tasseled cap transformation, hybrid classification as a combination of k-means and support vector machine algorithms,and post-classification comparison were respectively implemented to detect and assess LULC in Halabja. …”
Get full text
Get full text
Thesis -
14
Embedded vision system development using 32-bit Single Board Computer and GNU/Linux
Published 2011“…The image processing algorithm includes color space conversion and motion analysis technique. …”
Get full text
Thesis -
15
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…The offline scheme utilizes a Time-based One-Time Password (TOTP) algorithm to allow users to authenticate to the vehicle without needing an Internet connection once they have registered online when Internet access is available. …”
Get full text
Get full text
Thesis
