Search Results - (( network implementation force algorithm ) OR ( java application during algorithm ))

Refine Results
  1. 1

    Node placement optimization using extended virtual force and cuckoo search algorithm in wireless sensor network by Puteri Azwa, Ahmad

    Published 2014
    “…This study proposed Extended Virtual Force and Cuckoo Search (EVFCS) algorithm with a combination of EVFA and CS algorithm to find an optimal node placement. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    An intelligent method to estimate the inertia matrix of a robot arm for active force control using on-line neural network training scheme by Hussein, Shamsul Bahri, Jamaluddin, Hishamuddin, Mailah, Musa

    Published 1999
    “…This paper presents a new intelligent controller algorithm comprising an on-line multi-layer artificial neural network (ANN) training scheme to estimate the inertia matrix of the robot arm to enhance the performance of the active force control (AFC) scheme. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3
  4. 4

    A new fair marker algorithm for DiffServ networks by Elshaikh, M.A., Mohamed, Othman, Subramaniam, Shamala, Md. Desa, Jalil

    Published 2008
    “…The paper design and implement the algorithm with extensive simulations using NS-2 simulator to compare the proposed algorithm with previous algorithms. …”
    Get full text
    Get full text
    Article
  5. 5

    Features selection for IDS in encrypted traffic using genetic algorithm by Barati, Mehdi, Abdullah, Azizol, Mahmod, Ramlan, Mustapha, Norwati, Udzir, Nur Izura

    Published 2013
    “…This paper presents a hybrid feature selection using Genetic Algorithm and Bayesian Network to improve Brute Force attack detection in Secure Shell (SSH) traffic.Brute Force attack traffic collected in a client-server model is implemented in proposed method.Our results prove that the most efficient features were selected by proposed method.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Practical implementation of skyhook and adaptive active force control to an automotive suspension system by Priyandoko, Gigih, Musa, Mailah, Jamaluddin, Hishamuddin

    Published 2008
    “…The paper focuses on the practical implementation of a new robust control method to an automotive active suspension system using skyhook and adaptive active force control (SANAFC) strategy. …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7
  8. 8

    Features selection for ids in encrypted traffic using genetic algorithm by Barati, Mehdi, Abdullah, Azizol, Mahmod, Ramlan, Mustapha, Norwati, Udzir, Nur Izura

    Published 2013
    “…This paper presents a hybrid feature selection using Genetic Algorithm and Bayesian Network to improve Brute Force attack detection in Secure Shell (SSH) traffic. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Real time self-calibration algorithm of pressure sensor for robotic hand glove system by Almassri, Ahmed M. M.

    Published 2019
    “…The proposed method was validated by comparing the output force of PSCA with the experimental target force from load cell (reference). …”
    Get full text
    Get full text
    Thesis
  10. 10

    Genetic algorithm based for optimizing filter design / Rohana Awang Ahmed by Awang Ahmed, Rohana

    Published 2000
    “…GA is then implemented using the Genetic Algorithm Toolbox (GAOT). …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    DSP-based flexible digital hysteresis in switched capacitor active power filter by Rahim, N.A., Radzi, M.A.M.

    Published 2010
    “…By integrating hysteresis current control with digital-based neural network harmonic detection, the proposed SCAPF forces the supply current to be sinusoidal, to have low current harmonics, and to be in phase with the line voltage. …”
    Get full text
    Article
  13. 13

    SUDOKU HELPER by Abdul Razak, Muhammad Asyraf

    Published 2015
    “…In this paper research, author presents an algorithm to provide a tutorial for any Sudoku player who got stuck during the solving process. …”
    Get full text
    Get full text
    Final Year Project
  14. 14

    Efficient and secured compression and steganography technique in wireless sensor network by Tuama, Ammar Yaseen

    Published 2016
    “…Furthermore, some analyses on hiding quality show that our algorithm retains the cover image quality as high as that of standard LSB algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Enhanced Ad Hoc On-Demand Distance Vector Routing Protocol For Mobile Ad Hoc Network Internet Connectivity by Gurusamy, Gobi

    Published 2006
    “…The Internet Engineering Task Force (IEFT) currently has a working group called mobile Ad hoc network (MANET) that is working on routing specification for Ad hoc networks. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Financial time series predicting using machine learning algorithms by Tiong, Leslie Ching Ow *

    Published 2013
    “…Thereafter, Artificial Neural Network (ANN) and Support Vector Machine (SVM) algorithms are implemented separately to train with the trend patterns for predicting the movement direction of financial trends. …”
    Get full text
    Thesis
  17. 17

    Multicast-Based Mobile Ipv6 Join/Leave Mechanism Software by A.M. Ali, Sahar

    Published 2003
    “…Hence, IP-multicast provides a scalable infrastructure for efficient, location-independent, packet delivery.The recent advances in wireless communication technology and the growth of the Internet have paved the way for wireless networking and IP mobility. Unlike conventional wired networks, wireless networks possess different channel characteristics and mobility dynamics that render network design and analysis more cha1lenging. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Key schedule algorithm based on coordinate geometry of a three-dimensional hybrid cube by Mushtaq, Muhammad Faheem

    Published 2019
    “…Cryptographic algorithms play an important role in information security where it ensures the security of data across the network or storage. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Intelligent motion planning of a mobile robot by using convolutional neural network / Siti Asmah Abdullah by Siti Asmah, Abdullah

    Published 2019
    “…Planning the path of the mobile robot by using Convolutional Neural Network (CNN) is important in optimizing the cost in terms of energy, time and human intervention force. …”
    Get full text
    Get full text
    Get full text
    Thesis