Search Results - (( program work force algorithm ) OR ( java application modified algorithm ))
Search alternatives:
- application modified »
- java application »
- force algorithm »
- program work »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
Genetic algorithm based for optimizing filter design / Rohana Awang Ahmed
Published 2000“…The process involves a lot of computational work and mistakes are easily made. There is also possibility that the design does not meet specification thus forcing the process to be repeated. …”
Get full text
Get full text
Thesis -
3
Development of a software for simulating active force control schemes of a two-link planar manipulator
Published 2005“…On Top Of That, The Graphical Results Can Be Observed And Analysed On-Line While The Program Is Running. By Using Matlab And Its Gui Facility, All The AFC Schemes Already Described In The Previous Works Such As The AFC With Crude Approximation Method, AFC And Iterative Learning (Afcail), AFC And Neural Network (Afcann), AFC And Fuzzy Logic (Afcafl), And AFC And Genetic Algorithm (Afcaga) Schemes Were Linked Into A Single Menu-Driven Program Where Each Of The Scheme Can Be Easily Selected And Executed By The User. …”
Get full text
Get full text
Get full text
Article -
4
Development of a software for simulating active force control schemes of a two–link planar manipulator
Published 2005“…On top of that, the graphical results can be observed and analysed on–line while the program is running. By using MATLAB and its GUI facility, all the AFC schemes already described in the previous works such as the AFC with crude approximation method, AFC and Iterative Learning (AFCAIL), AFC and Neural Network (AFCANN), AFC and Fuzzy Logic (AFCAFL), and AFC and Genetic Algorithm (AFCAGA) schemes were linked into a single menu–driven program where each of the scheme can be easily selected and executed by the user. …”
Get full text
Get full text
Get full text
Article -
5
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…A GUI is created in a form of JAVA application to display data detected from tag. …”
Get full text
Get full text
Thesis -
6
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…The algorithm is implemented as a plugin. It does not interfere with the web application original code. …”
Get full text
Get full text
Conference or Workshop Item -
7
Modeling and optimization of cold extrusion process by using response surface methodology and metaheuristic approaches
Published 2018“…Subsequently, the analytical approach and metaheuristic algorithms, specifically the particle swarm optimization, cuckoo search algorithm (CSA) and flower pollination algorithm, were applied to optimize the extrusion process parameters. …”
Get full text
Get full text
Article -
8
Two-axis position-based impedance control of a 2-DOF robotic finger / Khairunnisa Nasir
Published 2017“…The positionbased impedance control algorithm was designed by regulating the mechanical impedance of the robotic finger based on force measurements from the two embedded force sensors. …”
Get full text
Get full text
Thesis -
9
Numerical solution for Duffing-Van Der Pol Oscillator via block method
Published 2021“…The two-point block algorithm will be coded in C programming to minimize computational cost (calculation time). …”
Get full text
Get full text
Article -
10
Speed-up robust features based 3D object recognition for grasping by three fingered robot hand / Nurul Hanani Remeli
Published 2018“…Meanwhile, the strength of the gripping force is measured by comparing the result of motor position angle with the voltage from a force sensor attached at each of the robot finger tips. …”
Get full text
Get full text
Thesis -
11
Development of robust control scheme for wheeled mobile robot in restricted environment
Published 2021“…The experimental results work show the capability of the proposed algorithms and the new controller to robustly move the WMR in the constrained environments, thereby it verifys the simulation counterpart.…”
Get full text
Get full text
Thesis -
12
Numerical Solution For Duffing-van Der Pol Oscillator Via Block Method
Published 2024journal::journal article -
13
Human evacuation movement simulation model: Concepts and techniques
Published 2022“…Modelling is a method of solving problems that can be replaced by a simple object that describes the real system with its behaviour. A program with a running algorithm of a computer model is called a computer simulation. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Human evacuation movement simulation model: Concepts and techniques
Published 2022“…Modelling is a method of solving problems that can be replaced by a simple object that describes the real system with its behaviour. A program with a running algorithm of a computer model is called a computer simulation. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
16
-
17
-
18
-
19
Late Acceptance Hill Climbing Based Strategy for Test Redundancy Reduction and Prioritization
Published 2015“…LAHCS is the first known strategy that adopts Late Acceptance Hill Climbing Algorithm for test redundancy reduction and prioritization.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Controlling An-Inverted Pendulum System Using A Microcontroller
Published 2022“…Concurrently, a comparison is made between the present project and earlier work to assess the advantages and disadvantages of each. …”
Get full text
Get full text
Monograph
