Search Results - (( using factor force algorithm ) OR ( java application matching algorithm ))
Search alternatives:
- application matching »
- java application »
- force algorithm »
- using factor »
- factor force »
-
1
-
2
Optimal loading analysis with penalty factors for generators using brute force method
Published 2022“…This paper reports the optimal loading analysis method using the Brute Force method with and without considering the penalty factor of power line loss. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
-
4
-
5
Message based random variable length key encryption algorithm.
Published 2009Get full text
Get full text
Article -
6
Securing cloud data system (SCDS) for key exposure using AES algorithm
Published 2021“…The AES algorithm has its own structure to encrypt and decrypt sensitive data that make the attackers difficult to get the real data when encrypting by AES algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
-
8
Establishment of spectral subtraction-based algorithm for experimental modal analysis under operating condition
Published 2022“…Under the operating condition, the presence of unmeasurable forces causes an error in the transfer function calculation due to incomplete information of input forces. …”
Get full text
Get full text
Thesis -
9
-
10
Refinement of Tuned Mass Damper parameters on machine support structure using dynamic Cuckoo Search algorithm
Published 2025“…A classical Tuned Mass Damper (TMD) consists of a mass, spring, and viscous damper, typically optimized in the frequency domain to minimize the steady-state displacement amplitude of a primary structure under harmonic force excitation with varying frequency. This study proposes the use of a dynamic Cuckoo Search (CS) algorithm, a nature-inspired optimization method, to enhance the accuracy of TMD parameters when external factors, such as excitation frequency or structural properties, change. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
-
12
Generalized Triad Design Algorithms
Published 2012“…Previous studies on TD(v) reported its existence when v≡1 or 5 (mod 6) and TD(7) was developed by using a brute-force method. In this study, generalized and new algorithms for developing TD(v) for any v = 6n + 1 or v = 6n + 5 were developed. …”
Get full text
Get full text
Thesis -
13
Location-based Solar Energy Potential Prediction Algorithm for Mountainous Rural Landscapes
Published 2013“…This paper describes the implementation of an algorithm that can be used to predict solar energy potential of irregular landscapes. …”
Get full text
Get full text
Get full text
Article -
14
Optimal network reconfiguration and intelligent service restoration prediction technique based on Cuckoo search spring algorithm / Mohamad Izwan Zainal
Published 2022“…In addition, objective function using the same CSSA algorithm were applied i.e., Vmin and Ploss as the objective function, and multi-objective involves Vmin and Ploss as the objective function. …”
Get full text
Get full text
Thesis -
15
-
16
Adaptive force-position-speed collaborative process planning and roughness prediction for robotic polishing
Published 2025“…An adaptive impedance control strategy is implemented to enhance force control, and PD iteration and RBF neural networks are used to ensure stable contact force and accuracy. …”
Get full text
Get full text
Get full text
Article -
17
-
18
Hysteresis Modelling of Pneumatic Artificial Muscle using General Cubic Equation and Factor Theorem Prediction Method / Mohd Azuwan Mat Dzahir...[et al.]
Published 2017“…However, implementing a complicated control algorithm does not always indicate the best solution that could be used to control the pneumatic artificial muscles. …”
Get full text
Get full text
Article -
19
Development of optimized damage prediction method for health monitoring of ultra high performance fiber-reinforced concrete communication tower
Published 2018“…Therefore, this study aims to develop a new health monitoring system for communication towers based on AdaBoost, Bagging, and RUSBoost algorithms as hybrid algorithm, which can predict the damage by using noisy, random, unstable, and skewed frequency data with high accuracy. …”
Get full text
Get full text
Thesis -
20
On spectral efficiency maximization in a partial joint processing system using a multi-start particle swarm optimization algorithm
Published 2015“…However, achieving equivalent backhaul reduction based on limited feedback channel state information is challenging when linear techniques, such as zero-forcing beamforming (BF) are used, which led to the use of stochastic algorithms instead. …”
Get full text
Get full text
Conference or Workshop Item
