Search Results - (( pre processing force algorithm ) OR ( java application customization algorithm ))

  • Showing 1 - 8 results of 8
Refine Results
  1. 1

    Establishment of spectral subtraction-based algorithm for experimental modal analysis under operating condition by Che Ku Eddy Nizwan, Che Ku Husin

    Published 2022
    “…Therefore, output response from the measurement requires a filtering process to suppress the response from operating forces and retain only the response from the artificially induced force. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Efficient and secured compression and steganography technique in wireless sensor network by Tuama, Ammar Yaseen

    Published 2016
    “…In terms of security, the proposed solution is studied against brute-force attacks and the analysis shows that the new algorithm can withstand this type of attack with an ample amount of hiding possibilities that make the process of retrieving the message extremely diffi- cult. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5
  6. 6

    Mobile Crowd Steering Evacuation Model via Agent Based Simulation by Applying the Social Force Model by Norhaida, Binti Hussain, Wai Shiang, Cheah, Wai Loke, Seng

    Published 2025
    “…It overcomes the cost of capturing and pre-processing genuine crowd datasets. Famous simulation models include agent-based crowd guiding. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Camera geometry determination based on circular's shape for peg-in-hole task by Farah Adiba, Azman

    Published 2019
    “…The peg-in-hole task is widely used in manufacturing process by using vision system and sensors. However, it requires complex algorithm and high Degree of Freedom (DOF) mechanism with fine movement. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Development Of Finite Element Codes For Shear Wall Analysis by Paknahad, Masoud

    Published 2008
    “…The multilayer shell and beam elements are available in the element library of this finite element program.Both above finite element codes are equipped with pre, post processing and animation graphic facilities. …”
    Get full text
    Get full text
    Thesis