Search Results - (( safety implementation force algorithm ) OR ( java application customization algorithm ))
Search alternatives:
- customization algorithm »
- safety implementation »
- implementation force »
- java application »
- force algorithm »
-
1
Potential field methods and their inherent approaches for path planning
Published 2016“…Potential filed method is capable to overcome unknown scenario, taking into account the realities of the current environment of the robot motion. Two type of forces involved in potential field method; attractive force generated by goals and repulsive force generated by obstacles. …”
Get full text
Get full text
Article -
2
Enhanced PID for pedal vehicle force control using hybrid spiral sine-cosine optimization and experimental validation
Published 2025“…This study develops and validates a force feedback control system for automotive pedals utilizing an optimized PID controller using the hybrid Spiral Sine-Cosine algorithm (SSCA). …”
Get full text
Get full text
Get full text
Article -
3
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
4
Fuzzy-pid controller design for brake-by-wire system of electrical vehicle
Published 2014“…This is a clear evidence of obtaining safety aspects of the vehicle as well as passengers since control strategy could maintain optimal brake force that leads to shorter stopping distance, hence increasing safety aspects. …”
Get full text
Get full text
Thesis -
5
Study on effect of abs control system to the vehicle dynamic behavior during braking on various speed and road condition
Published 2021“…The vehicle safety system is divided into two groups that are passive safety and active safety system. …”
Get full text
Get full text
Thesis -
6
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
RaspyAir: self-monitoring system for wireless intrusion detection using raspberry pi / Mohd Nizam Osman and Mohd Syafiq Aiman Mohamad Zulrahim
Published 2016“…The brute-force algorithm is used to filter the traffic using signature based detection technique. …”
Get full text
Get full text
Get full text
Article -
8
Assessment of proposed lateral resistance system used with framed structures
Published 2016“…The specific finite element algorithms are developed and implemented in the finite element program code for the nonlinear analysis of RC framed buildings. …”
Get full text
Get full text
Thesis -
9
Modeling and Optimization of Tapered Rectangular Thin-walled Columns Subjected to Oblique Loading for Impact Energy Absorption
Published 2013“…Thin-walled column plays an important role for passenger safety during vehicle collision due to its ability to dissipate kinetic energy by deform in a controlled manner. …”
Get full text
Get full text
Conference or Workshop Item
