Search Results - (( using communication force algorithm ) OR ( java application customization algorithm ))
Search alternatives:
- customization algorithm »
- using communication »
- communication force »
- java application »
- force algorithm »
-
1
Labview Based Pid Algorithm Development for Z Motion Control in Atomic Force Microscopy
Published 2015“…In order to combine my hardware and software together, I have been written a PID algorithm in LabVIEW which can be communicate with the NI ELVIS to the piezoelectric buzzer to achieve Z motion control in atomic force microscopy.…”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
2
-
3
Cooperative source detection using an optimized distributed levy flight algorithm
Published 2023“…Additionally, to integrate cooperative behavior, an artificial attractive force is used to maintain communication among the agents. …”
Get full text
Get full text
Get full text
Article -
4
Performance and Diversity of Gravitational Search Algorithm
Published 2014Get full text
Get full text
Conference or Workshop Item -
5
Node placement strategy in wireless sensor network
Published 2013“…Node placement influences the target position, coverage area, and connectivity in sensor networks.In random deployment, sensor nodes are deployed randomly in a non-invasive way.The deployment process may cause issues like coverage holes, overlapping, and connectivity failure.Enhancing coverage and connectivity are important for sensor networks to provide a reliable communication within sensing.Placing many sensor nodes in a WSN application region area is not the best solution due to cost and it results in multiple sensors used.Mobile sensor node is used as an alternative to overcome the random deployment problem.The virtual force based self node deployment is used in the mobility sensor to improve the coverage and connectivity area.Virtual Force Algorithm (VFA) approach using virtual repulsive and attractive forces is used to find the optimal node placement to minimize the problems. …”
Get full text
Get full text
Article -
6
Efficient and secured compression and steganography technique in wireless sensor network
Published 2016“…However, the need to use less complex and low-cost sensor de- vice results in constraints in computational power, communication bandwidth, and operational energy. …”
Get full text
Get full text
Get full text
Thesis -
7
Development of optimized damage prediction method for health monitoring of ultra high performance fiber-reinforced concrete communication tower
Published 2018“…Therefore, this study aims to develop a new health monitoring system for communication towers based on AdaBoost, Bagging, and RUSBoost algorithms as hybrid algorithm, which can predict the damage by using noisy, random, unstable, and skewed frequency data with high accuracy. …”
Get full text
Get full text
Thesis -
8
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
9
A new fair marker algorithm for DiffServ networks
Published 2008Get full text
Get full text
Article -
10
An Adaptive Switching Cooperative Source Searching And Tracing Algorithms For Underwater Acoustic Source Localization
Published 2019“…In order to optimize search space exploration and to maintain inter-robot communication connectivity at swarm level, a dispersion algorithm based on attraction and repulsion force is proposed. …”
Get full text
Get full text
Thesis -
11
-
12
Modular motor driver with torque control for gripping mechanism
Published 2023“…Using the same hardware configuration, the different algorithms produced different outcomes on the output of the controller. …”
Conference paper -
13
Mode division multiplexing zero forcing equalisation scheme using LU factorization
Published 2016“…Till recently, multiplexing techniques in the optical communication rely on modulation techniques where polarization, amplitude and frequency of the signal are used as the main data carrier. …”
Get full text
Get full text
Get full text
Thesis -
14
ECG encryption enhancement with multi-layers of AES and DNA computing
Published 2023“…MATLAB 2017b, a reliable simulation method, was utilised throughout the construction and validation of the algorithm. The performance of the recommended approach makes it possible to thwart an attack using brute force considerably more fast than is possible with the encryption technologies that are currently in use. …”
Get full text
Get full text
Get full text
Thesis -
15
On spectral efficiency maximization in a partial joint processing system using a multi-start particle swarm optimization algorithm
Published 2015Get full text
Get full text
Conference or Workshop Item -
16
-
17
Exploring the impact of social media on political discourse: a case study of the Makassar mayoral election
Published 2024“…Election dynamics are examined using the naïve Bayes approach. To increase the accuracy and efficiency of text mining operations, especially in result validation, text clustering, and classification, the k-means algorithm and support vector machines (SVM) were used. …”
Get full text
Get full text
Get full text
Journal -
18
-
19
-
20
