Search Results - (( pre processing force algorithm ) OR ( java application customization algorithm ))
Search alternatives:
- customization algorithm »
- processing force »
- java application »
- force algorithm »
- pre processing »
-
1
Establishment of spectral subtraction-based algorithm for experimental modal analysis under operating condition
Published 2022“…Therefore, output response from the measurement requires a filtering process to suppress the response from operating forces and retain only the response from the artificially induced force. …”
Get full text
Get full text
Thesis -
2
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
3
Efficient and secured compression and steganography technique in wireless sensor network
Published 2016“…In terms of security, the proposed solution is studied against brute-force attacks and the analysis shows that the new algorithm can withstand this type of attack with an ample amount of hiding possibilities that make the process of retrieving the message extremely diffi- cult. …”
Get full text
Get full text
Get full text
Thesis -
4
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
ICS cyber attack detection with ensemble machine learning and DPI using cyber-Kit datasets
Published 2021“…The industrial datasets are pre-processed, profiled and the abnormality is analyzed with DPI. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
6
Mobile Crowd Steering Evacuation Model via Agent Based Simulation by Applying the Social Force Model
Published 2025“…It overcomes the cost of capturing and pre-processing genuine crowd datasets. Famous simulation models include agent-based crowd guiding. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Camera geometry determination based on circular's shape for peg-in-hole task
Published 2019“…The peg-in-hole task is widely used in manufacturing process by using vision system and sensors. However, it requires complex algorithm and high Degree of Freedom (DOF) mechanism with fine movement. …”
Get full text
Get full text
Thesis -
8
Development Of Finite Element Codes For Shear Wall Analysis
Published 2008“…The multilayer shell and beam elements are available in the element library of this finite element program.Both above finite element codes are equipped with pre, post processing and animation graphic facilities. …”
Get full text
Get full text
Thesis
