Search Results - (( parameter evaluation force algorithm ) OR ( java application during algorithm ))

Refine Results
  1. 1

    Calibration of optical based silicone tactile sensor based on image deformation technique / Abdul Halim Esa by Esa, Abdul Halim

    Published 2016
    “…Based on these three parameters, three different types of algorithm are developed in order to measure experimentally the forces and deformation based on optical information of the tactile sensor. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Improved criteria determination of an automated negative lightning return strokes characterisation using Brute-Force search algorithm by Abdul Haris, Faranadia

    Published 2021
    “…Accordingly, the proposed Brute-Force search algorithm characterised the negative lightning return strokes parameters based on the seven parameters. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Refinement of Tuned Mass Damper parameters on machine support structure using dynamic Cuckoo Search algorithm by Ahmad Muinuddin, Mahmood, Zamri, Mohamed, Rosmazi, Rosli

    Published 2025
    “…The research aims to optimize key TMD parameters (mass ratio, damping ratio, and frequency ratio) using the dynamic CS algorithm. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Machine learning model to predict the contact of angle using mineralogy, TOC and process parameters in shale by Ameenuddin Irfan, S., Fadhli, M.Z., Padmanabhan, E.

    Published 2021
    “…A machine learning is needed to predict the contact angle in the shale using the process parameters and TOC and Minerology of the shale. Minerology and Total Organic Carbon (TOC) content are some of the important parameters to be evaluated for reservoir characterization. …”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    SUDOKU HELPER by Abdul Razak, Muhammad Asyraf

    Published 2015
    “…In this paper research, author presents an algorithm to provide a tutorial for any Sudoku player who got stuck during the solving process. …”
    Get full text
    Get full text
    Final Year Project
  7. 7

    Crowd behavior monitoring using self-adaptive social force model by Wan Nur Azhani, W. Samsudin, Kamarul Hawari, Ghazali

    Published 2019
    “…The current method used is Social Force Model (SFM), which can describe the behavior of a crowd based on the interaction forces between individuals. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  8. 8
  9. 9

    Hardware-in-the-loop study of a hybrid active force control scheme of an upper-limb exoskeleton for passive stroke rehabilitation by Anwar, P. P. Abdul Majeed

    Published 2018
    “…A hardware-in-the-loop simulation is carried out to evaluate the appropriate gains of both the PD and the AFC inertial parameter gained that is tuned via the SKF algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Hardware-in-the-loop study of a hybrid active force control scheme of an upper-limb exoskeleton for passive stroke rehabilitation by Anwar, P. P. Abdul Majeed

    Published 2018
    “…A hardware-in-the-loop simulation is carried out to evaluate the appropriate gains of both the PD and the AFC inertial parameter gained that is tuned via the SKF algorithm. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Application of inerter in passenger vehicle suspension systems / Soong Ming Foong by Soong, Ming Foong

    Published 2015
    “…Also, the practicality of a parallel inerter implementation was studied by investigating the feasibility of an inerter incorporating damping. Then, switching algorithms were implemented to the inerter to evaluate potential further ride performance improvement brought by these modifications. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Modeling and multi-objective optimal sizing of standalone photovoltaic system based on evolutionary algorithms by Ridha, Hussein Mohammed

    Published 2020
    “…Firstly, an improved EM (IEM) algorithm is presented to estimate the five parameters of the single PV-module system. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Application of system identification method coupled with evolutionary algorithms for the optimization of power consumption in a pem fuel cell propulsion system / Suhadiyana Hanapi by Hanapi, Suhadiyana

    Published 2018
    “…The ability to construct accurate mathematical models of real systems is an important part of the control parameters in prototype PEM fuel cell systems for vehicles. …”
    Get full text
    Get full text
    Book Section
  15. 15

    Effect of bed vicinity on vortex shedding and force coefficients of fluid flow on an offshore pipeline by Namazi-saleh, F., Kurian, V.J., Mustaffa, Z., Tahan, M., Kim, D.

    Published 2017
    “…Evaluation of the developed numerical model shows that the proposed technique is capable of properly predicting hydrodynamic forces and simulating the flow pattern. …”
    Get full text
    Get full text
    Article
  16. 16

    An Adaptive Switching Cooperative Source Searching And Tracing Algorithms For Underwater Acoustic Source Localization by Majid, Mad Helmi Ab.

    Published 2019
    “…By considering the ASVs as swarm robotics testing platforms, each algorithm is evaluated and benchmarked against several existing algorithms through simulation studies. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  19. 19
  20. 20

    An enhanced fuzzy commitment scheme in biometric template protection by Taqiyah Khadijah, Ghazali

    Published 2023
    “…Phase four, involved with the evaluation of the proposed approach. The security and privacy analysis shows that with the additional hash function, it is difficult for adversary to perform brute‐force attack on information stored in database. …”
    Get full text
    Get full text
    Get full text
    Thesis