Search Results - (( program computing force algorithm ) OR ( java application tools algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The key is the trigger mechanism to the algorithm. Until the advent of the Internet, encryption was rarely used by the public, but was largely a military tool. …”
    Get full text
    Get full text
    Final Year Project
  4. 4
  5. 5

    Genetic algorithm based for optimizing filter design / Rohana Awang Ahmed by Awang Ahmed, Rohana

    Published 2000
    “…The process involves a lot of computational work and mistakes are easily made. There is also possibility that the design does not meet specification thus forcing the process to be repeated. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    An Educational Tool Aimed at Learning Metaheuristics by Kader, Md. Abdul, Jamaluddin, Jamal A., Kamal Z., Zamli

    Published 2020
    “…Initially, this tool adopts only Crow Search, Jaya, and Sine Cosine algorithms. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    A hybrid intelligent active force controller for robot arms using evolutionary neural networks by Hussein, S.B, Jamaluddin, H, Mailah, M, Zalzala, A.M.S

    Published 2000
    “…The EC part of the algorithm composes of a hybrid genetic algorithm (GA) and an evolutionary program (EP). …”
    Get full text
    Get full text
    Article
  9. 9
  10. 10

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…This project is developed by using Rapid Application Development methodology as it is the model that is most suitable for developing this web tools. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Hybrid intelligent active force controller for robot arms using evolutionary neural networks by Hussein, S. B., Jamaluddin, H., Mailah, M., Zalzala, A. M. S.

    Published 2000
    “…The EC part of the algorithm composes of a hybrid genetic algorithm (GA) and an evolutionary program (EP). …”
    Get full text
    Get full text
    Article
  12. 12
  13. 13

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  14. 14

    Development of a software for simulating active force control schemes of a two-link planar manipulator by Mailah, Musa, Poh, Yang Liang

    Published 2005
    “…The Paper Describes The Development Of A Software In The Form Of An Interactive Computer Program That Integrates A Number Of Robotic Control Schemes With The Active Force Control (Afc) Strategy As The Key Element Of The Robotic System That Assumes A Rigid Two-Link Planar Configuration. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework by Asaad Aref, Ibrahim

    Published 2004
    “…Java Media Framework library and the RTP protocol for audio transmission were used as development tools.The developed system designed in this thesis together with experimental results proved that the system could be implemented successfully. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Computer remote monitoring via mobile phones using socket programming / Samih Omer Fadlelmola Elkhider by Omer Fadlelmola Elkhider, Samih

    Published 2011
    “…The approach of the mobile cloud is clearly occurring with web host servers expands thus large number of data around the world stored in huge servers, consumers of mobile devices and small computing devices have high performance expectations usually, therefore mobile cloud computing theorizes that the cloud will soon become a disruptive force in the mobile world, eventually becoming the dominant way in which mobile applications operates. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Enhancing cloud data security using hybrid of advanced encryption standard and Blowfish encryption algorithms by -, Salma, Olanrewaju, Rashidah Funke, Abdullah, Khaizuran, -, Rusmala, Darwis, Herdianti

    Published 2019
    “…There are a number of costumers like corporate components, social media programs and individual customers are all moving towards to the vast area of cloud computing. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  18. 18

    Development of a software for simulating active force control schemes of a two–link planar manipulator by Mailah, Musa, Poh, Yang Liang

    Published 2005
    “…The paper describes the development of a software in the form of an interactive computer program that integrates a number of robotic control schemes with the active force control (AFC) strategy as the key element of the robotic system that assumes a rigid two–link planar configuration. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Development of finite element model for soil-structure interaction by Shoaei, Mohammad Dalili

    Published 2014
    “…Then, the special finite element algorithm and computer program (2DSSI) is developed to perform two-dimensional nonlinear SSI analysis by considering interfacial behavior of soil and frame elements. …”
    Get full text
    Get full text
    Thesis