Search Results - (( using communication force algorithm ) OR ( java application customization algorithm ))

Refine Results
  1. 1

    Labview Based Pid Algorithm Development for Z Motion Control in Atomic Force Microscopy by Teh, Yong Hui

    Published 2015
    “…In order to combine my hardware and software together, I have been written a PID algorithm in LabVIEW which can be communicate with the NI ELVIS to the piezoelectric buzzer to achieve Z motion control in atomic force microscopy.…”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  2. 2
  3. 3

    Cooperative source detection using an optimized distributed levy flight algorithm by Ab.Majid, Mad Helmi, Arshad, Mohd Rizal, Yahya, Mohd Faid

    Published 2023
    “…Additionally, to integrate cooperative behavior, an artificial attractive force is used to maintain communication among the agents. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4
  5. 5

    Node placement strategy in wireless sensor network by Ahmad, Puteri Azwa, Mahmuddin, Massudi, Omar, Mohd Hasbullah

    Published 2013
    “…Node placement influences the target position, coverage area, and connectivity in sensor networks.In random deployment, sensor nodes are deployed randomly in a non-invasive way.The deployment process may cause issues like coverage holes, overlapping, and connectivity failure.Enhancing coverage and connectivity are important for sensor networks to provide a reliable communication within sensing.Placing many sensor nodes in a WSN application region area is not the best solution due to cost and it results in multiple sensors used.Mobile sensor node is used as an alternative to overcome the random deployment problem.The virtual force based self node deployment is used in the mobility sensor to improve the coverage and connectivity area.Virtual Force Algorithm (VFA) approach using virtual repulsive and attractive forces is used to find the optimal node placement to minimize the problems. …”
    Get full text
    Get full text
    Article
  6. 6

    Efficient and secured compression and steganography technique in wireless sensor network by Tuama, Ammar Yaseen

    Published 2016
    “…However, the need to use less complex and low-cost sensor de- vice results in constraints in computational power, communication bandwidth, and operational energy. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Development of optimized damage prediction method for health monitoring of ultra high performance fiber-reinforced concrete communication tower by Gatea, Sarah Jabbar

    Published 2018
    “…Therefore, this study aims to develop a new health monitoring system for communication towers based on AdaBoost, Bagging, and RUSBoost algorithms as hybrid algorithm, which can predict the damage by using noisy, random, unstable, and skewed frequency data with high accuracy. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    An Adaptive Switching Cooperative Source Searching And Tracing Algorithms For Underwater Acoustic Source Localization by Majid, Mad Helmi Ab.

    Published 2019
    “…In order to optimize search space exploration and to maintain inter-robot communication connectivity at swarm level, a dispersion algorithm based on attraction and repulsion force is proposed. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Modular motor driver with torque control for gripping mechanism by How D.N.T., Baharuddin M.Z., Mohideen S.S.K., Sahari K.S.M., Anuar A.

    Published 2023
    “…Using the same hardware configuration, the different algorithms produced different outcomes on the output of the controller. …”
    Conference paper
  13. 13

    Mode division multiplexing zero forcing equalisation scheme using LU factorization by Mohamed, Ahmed Sayed

    Published 2016
    “…Till recently, multiplexing techniques in the optical communication rely on modulation techniques where polarization, amplitude and frequency of the signal are used as the main data carrier. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    ECG encryption enhancement with multi-layers of AES and DNA computing by Kh-Madhloom, Jamal

    Published 2023
    “…MATLAB 2017b, a reliable simulation method, was utilised throughout the construction and validation of the algorithm. The performance of the recommended approach makes it possible to thwart an attack using brute force considerably more fast than is possible with the encryption technologies that are currently in use. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16
  17. 17

    Exploring the impact of social media on political discourse: a case study of the Makassar mayoral election by Jufri, Aedah, Abd Rahman, Suarga, .

    Published 2024
    “…Election dynamics are examined using the naïve Bayes approach. To increase the accuracy and efficiency of text mining operations, especially in result validation, text clustering, and classification, the k-means algorithm and support vector machines (SVM) were used. …”
    Get full text
    Get full text
    Get full text
    Journal
  18. 18
  19. 19
  20. 20