Search Results - (( solution implementation force algorithm ) OR ( java application customization algorithm ))

Refine Results
  1. 1

    Magnetic Optimization Algorithm Approach For Travelling Salesman Problem by Ismail, Mohd Muzafar, Zakaria, Muhammad Iqbal, Zainal Abidin, Amar Faiz, Mad Juliani, Juwita, Lit, Asrani, Mirjalili, Seyedali, Nordin, Nur Anis, Mohamed Saaid, Muhammad Faiz

    Published 2012
    “…In this implementation, each magnetic agent or particle in Magnetic Optimization Algorithm represents a candidate solution of the Travelling Salesman Problem. …”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    Integrating fuzzy logic and brute force algorithm in optimizing energy management systems for battery electric vehicles by Abulifa, Abdulhadi Abdulsalam, Che Soh, Azura, Hassan, Mohd Khair, Raja Kamil, Mohd Radzi, Mohd Amran

    Published 2023
    “…This research proposes a solution to achieve more efficient control of HVAC consumption by integrating fuzzy logic techniques with brute-force algorithms to optimize the Energy Management System (EMS) in BEVs. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3
  4. 4

    Integrating fuzzy logic and brute force algorithm in optimizing Energy Management Systems for Battery Electric Vehicles by Abdulsalam Abulifa, Abdulhadi, Che Soh, Azura, Hassan, Mohd Khair, Kamil, Raja, Mohd Radzi, Mohd Amran

    Published 2024
    “…This research proposes a solution to achieve more efficient control of HVAC consumption by integrating fuzzy logic techniques with brute-force algorithms to optimize the Energy Management System (EMS) in BEVs. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5
  6. 6
  7. 7

    On Newton-Raphson formulation and algorithm for displacement based structural dynamics problem with quadratic damping nonlinearity by Koh, K.J., Yasreen, A.Y.M.

    Published 2017
    “…Consequently, ambiguity related to kinematics update arises when implementing the time integration-iterative algorithm. …”
    Get full text
    Get full text
    Article
  8. 8

    Efficient and secured compression and steganography technique in wireless sensor network by Tuama, Ammar Yaseen

    Published 2016
    “…In terms of security, the proposed solution is studied against brute-force attacks and the analysis shows that the new algorithm can withstand this type of attack with an ample amount of hiding possibilities that make the process of retrieving the message extremely diffi- cult. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Force and impedance control for hydraulically driven hexapod robot walking on uneven terrain by Addie Irawan, Hashim

    Published 2012
    “…A variety approach of multi-legged robot designs, especially on a large scale design with hydraulically driven actuators exist, but most of it still unsolved and used primitive techniques on control solutions. This made this area of research still far from demonstrating the scientific solutions, which is more towards developing and optimizing the algorithm, control technique and software engineering for practical locomotion (flexibility and reliability). …”
    Get full text
    Get full text
    Thesis
  10. 10

    Low fatigue walking-in-place locomotion technique for mobile VR using smartphone’s inertia sensors by Ang, Yang Yi

    Published 2020
    “…Bilateral Horizontal Impulse (BHI) detection algorithm is introduced to detect the positive and negative impulsive force captured from yaxis of accelerometer. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Optimization and prediction of battery electric vehicle driving range using adaptive fuzzy technique by Abulifa, Abdulhadi Abdulsalam

    Published 2022
    “…The work in this thesis is expected to be the best approach in formulating an adaptive fuzzy technique based on brute force and regression algorithms for optimization and prediction of EMS in BEV application.…”
    Get full text
    Get full text
    Thesis
  12. 12

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  13. 13

    POISSON EQUATION FOR ELECTROSTATIC FIELD USING THE FINITE DIFFERENCE METHOD by IFFAH FATHANAH, AHMAD RAZALI

    Published 2019
    “…This problem will be solved via matrix and successive over relation to get a good solution for the implementation result.…”
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  14. 14

    Hysteresis Modelling of Pneumatic Artificial Muscle using General Cubic Equation and Factor Theorem Prediction Method / Mohd Azuwan Mat Dzahir...[et al.] by Mat Dzahir, Mohd Azuwan, Mat Dzahir, Mohd Azwarie, Hussein, Mohamed, Ahmad, Zair Asrar, Mohamad, Maziah, Mad Saad, Shaharil

    Published 2017
    “…However, implementing a complicated control algorithm does not always indicate the best solution that could be used to control the pneumatic artificial muscles. …”
    Get full text
    Get full text
    Article
  15. 15
  16. 16
  17. 17

    Optimal SVC allocation via symbiotic organisms search for voltage security improvement by Zamani M.K.M., Musirin I., Mustaffa S.A.S., Suliman S.I.

    Published 2023
    “…In this paper, Symbiotic Organisms Search (SOS) algorithm is implemented to solve for optimal allocation of SVC in the power system. …”
    Article
  18. 18

    Multicast-Based Mobile Ipv6 Join/Leave Mechanism Software by A.M. Ali, Sahar

    Published 2003
    “…IP-multicast provides efficient algorithms for multiple packet delivery. It also provides location-independent group addressing. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Performance Comparison Of Intelligent Tuning Methods Using Pid-Afcga And Pid-Afcpso In Attenuating The Vibration Of The Suspended Handle Model by Choo, Kinn

    Published 2021
    “…Thus, several tuning methods such as crude approximation (CA), genetic algorithm (GA) and particle swarm optimization (PSO) are implemented and compared based on the performance of the suspended handle model under different vibration. …”
    Get full text
    Get full text
    Monograph
  20. 20

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item