Search Results - (( network implementation force algorithm ) OR ( java application matching algorithm ))
Search alternatives:
- network implementation »
- implementation force »
- application matching »
- java application »
- force algorithm »
-
1
-
2
Node placement optimization using extended virtual force and cuckoo search algorithm in wireless sensor network
Published 2014“…This study proposed Extended Virtual Force and Cuckoo Search (EVFCS) algorithm with a combination of EVFA and CS algorithm to find an optimal node placement. …”
Get full text
Get full text
Get full text
Thesis -
3
An intelligent method to estimate the inertia matrix of a robot arm for active force control using on-line neural network training scheme
Published 1999“…This paper presents a new intelligent controller algorithm comprising an on-line multi-layer artificial neural network (ANN) training scheme to estimate the inertia matrix of the robot arm to enhance the performance of the active force control (AFC) scheme. …”
Get full text
Get full text
Get full text
Article -
4
-
5
A new fair marker algorithm for DiffServ networks
Published 2008“…The paper design and implement the algorithm with extensive simulations using NS-2 simulator to compare the proposed algorithm with previous algorithms. …”
Get full text
Get full text
Article -
6
Features selection for IDS in encrypted traffic using genetic algorithm
Published 2013“…This paper presents a hybrid feature selection using Genetic Algorithm and Bayesian Network to improve Brute Force attack detection in Secure Shell (SSH) traffic.Brute Force attack traffic collected in a client-server model is implemented in proposed method.Our results prove that the most efficient features were selected by proposed method.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Practical implementation of skyhook and adaptive active force control to an automotive suspension system
Published 2008“…The paper focuses on the practical implementation of a new robust control method to an automotive active suspension system using skyhook and adaptive active force control (SANAFC) strategy. …”
Get full text
Get full text
Conference or Workshop Item -
8
-
9
Features selection for ids in encrypted traffic using genetic algorithm
Published 2013“…This paper presents a hybrid feature selection using Genetic Algorithm and Bayesian Network to improve Brute Force attack detection in Secure Shell (SSH) traffic. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Real time self-calibration algorithm of pressure sensor for robotic hand glove system
Published 2019“…The proposed method was validated by comparing the output force of PSCA with the experimental target force from load cell (reference). …”
Get full text
Get full text
Thesis -
11
Adaptive force-position-speed collaborative process planning and roughness prediction for robotic polishing
Published 2025“…An adaptive impedance control strategy is implemented to enhance force control, and PD iteration and RBF neural networks are used to ensure stable contact force and accuracy. …”
Get full text
Get full text
Get full text
Article -
12
Genetic algorithm based for optimizing filter design / Rohana Awang Ahmed
Published 2000“…GA is then implemented using the Genetic Algorithm Toolbox (GAOT). …”
Get full text
Get full text
Thesis -
13
-
14
-
15
Potential field methods and their inherent approaches for path planning
Published 2016Get full text
Get full text
Article -
16
DSP-based flexible digital hysteresis in switched capacitor active power filter
Published 2010“…By integrating hysteresis current control with digital-based neural network harmonic detection, the proposed SCAPF forces the supply current to be sinusoidal, to have low current harmonics, and to be in phase with the line voltage. …”
Get full text
Article -
17
Message based random variable length key encryption algorithm.
Published 2009Get full text
Get full text
Article -
18
Securing cloud data system (SCDS) for key exposure using AES algorithm
Published 2021“…The AES algorithm has its own structure to encrypt and decrypt sensitive data that make the attackers difficult to get the real data when encrypting by AES algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
19
Efficient and secured compression and steganography technique in wireless sensor network
Published 2016“…Furthermore, some analyses on hiding quality show that our algorithm retains the cover image quality as high as that of standard LSB algorithm. …”
Get full text
Get full text
Get full text
Thesis -
20
Enhanced Ad Hoc On-Demand Distance Vector Routing Protocol For Mobile Ad Hoc Network Internet Connectivity
Published 2006“…The Internet Engineering Task Force (IEFT) currently has a working group called mobile Ad hoc network (MANET) that is working on routing specification for Ad hoc networks. …”
Get full text
Get full text
Thesis
