Search Results - (( programming using cnc algorithm ) OR ( java data normalization algorithm ))
Search alternatives:
- normalization algorithm »
- data normalization »
- cnc algorithm »
- using cnc »
- java »
-
1
Reference-pulse CNC parametric curve real-time interpolator parallel algorithm using parallel programming
Published 2010Get full text
Working Paper -
2
A Novel Integrating Between Tool Path Optimization Using An ACO Algorithm And Interpreter For Open Architecture CNC System
Published 2021“…Furthermore, high-performing Ant Colony Optimization (ACO) algorithms were used to optimize the travel path time. …”
Get full text
Get full text
Get full text
Get full text
Article -
3
Peningkatan halaju suapan maksimum penginterpolasi CNC dedenyut rujukan menggunakan pengaturcaraan selari
Published 2011“…The main research objective is to modify the existing Wan Yusoff reference-pulse CNC interpolator and Omirou reference-pulse CNC interpolator using parallel programming to increase maximum allowable feed rate. …”
Get full text
Get full text
Thesis -
4
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…Even a normal people using clustering to grouping their data. …”
Get full text
Get full text
Thesis -
5
Graphical user interface for surface roughness prediction of CNC milling machine / Muhammad Qayyum Nor Asffan
Published 2020“…It can function to analyse data, develop algorithms even create models and applications. In this research, MATLAB Graphical User Interface (GUI) is used to develop a user- friendly program that can predict surface roughness of Aluminium 6061 in CNC milling machine. …”
Get full text
Get full text
Student Project -
6
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
7
The application of computer aided design and manufacturing (CAD/CAM) for teaching aid / Noorashidi Nazari
Published 1991“…This project also include the algorithms to improve the efficiency of machining which in an extension of the primitives CNC procedures. …”
Get full text
Get full text
Student Project -
8
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Electing the best set of features will help to improve the classifier predictions in terms of the normal and abnormal pattern. The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
Get full text
Get full text
Thesis -
9
Design and manufacturing of a new CNC gantry machine with double motion feed drive system / Seyed Reza Besharati
Published 2015“…Parts can be grooved and threaded with CNC milling centers; they can be transformed into CNC lathes, CNC drill and tap areas; for CNC grinding; and used in conjunction with routers to make CNC wood engravers and letterers. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
10
Integration Of G-Code With Position Controller Via Interpreter Design Using MATLAB For Milling Machine Application
Published 2019“…A user interface of G-code-position controller (GPC) interpreter was designed using uicontrol objects in MATLAB GUI platform and Callbacks were programmed in Scripts Editor. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
Challenges of hidden data in the unused area two within executable files
Published 2009“…The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
Get full text
Get full text
Get full text
Article -
12
Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions
Published 2017“…Two sets of experimental data involving 20 diabetic patients and 20 healthy subjects were collected from CITO laboratory Semarang Central Java, Indonesia. …”
Get full text
Get full text
Get full text
Get full text
Thesis
