Search Results - (( variable activation control algorithm ) OR ( java information using algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis outlines the two different implementation techniques of the existing FLEX algorithm using java based parsers and using a query language for XML. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…These data are processed and stored in appropriate formats in a MySQL server database. Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6
  7. 7
  8. 8

    A novel inertia moment estimation algorithm collaborated with active force control scheme for wheeled mobile robot control in constrained environments by Ali, Mohammed A. H., M. S. A., Radzak, Musa, Mailah, Nukman, Yusoff, Abd Razak, Bushroa, Mohd Sayuti, Ab. Karim, Ameen, Wadea, Jabbar, Waheb A., Alsewari, Abdulrahman A., Rassem, Taha H., Abdullah Nasser, Mohammed Abdullah, Abdulghafor, Rawad

    Published 2021
    “…This paper presents a novel inertia moment estimation algorithm to enable the Active Force Control Scheme for tracking a wheeled mobile robot (WMR) effectively in a specific trajectory within constrained environments such as on roads or in factories. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    A novel inertia moment estimation algorithm collaborated with active force control scheme for wheeled mobile robot control in constrained environments by Ali, Mohammed A. H., Radzak, Muhammad S. A., Mailah, Musa, Yusoff, Nukman, Abd Razak, Bushroa, Ab.Karim, Mohd Sayuti, Ameen, Wadea, Jabbar, Waheb A., Alsewari, Abdulrahman A., Rassem, Taha H., Nasser, Abdullah B., Abdulghafor, Rawad

    Published 2021
    “…This paper presents a novel inertia moment estimation algorithm to enable the Active Force Control Scheme for tracking a wheeled mobile robot (WMR) effectively in a specific trajectory within constrained environments such as on roads or in factories. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    A novel inertia moment estimation algorithm collaborated with active force control scheme for wheeled mobile robot control in constrained environments by Ali, Mohammed A.H., Radzak, Muhammad S.A., Mailah, Musa, Yusoff, Nukman, Abd Razak, Bushroa, Ab. Karim, Mohd Sayuti, Ameen, Wadea, A. Jabbar, Waheb, Alsewari, AbdulRahman A., Rassem, Taha H., Nasser, Abdullah B., Abdulmolla Abdulghafor, Rawad Abdulkhaleq

    Published 2021
    “…This paper presents a novel inertia moment estimation algorithm to enable the Active Force Control Scheme for tracking a wheeled mobile robot (WMR) effectively in a specific trajectory within constrained environments such as on roads or in factories. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Shunt active power filter using hybrid fuzzy-proportional and crisp-integral control algorithms for total harmonic distortion improvement by Abdul Rahman, Nor Farahaida

    Published 2016
    “…Additionally, the proposed HFP+CI voltage control algorithm has resulted fastest response time; it is 94% faster than using the Fuzzy-PI voltage control algorithm and 6% faster than using the Crisp-PI voltage control algorithm.Hence, it can be concluded that the proposed algorithms have successfully performed their functions by effectively enhancing the operation of the SAPF.…”
    Get full text
    Get full text
    Thesis
  13. 13

    Hybrid cryptography algorithm to improve security cloud storage by Abd Almohsen, Inam Razzaq

    Published 2017
    “…Utilization of a solitary algorithm is not powerful for extra ordinary state security to information in cloud computing. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    Text messaging encryption system by Sundara Morthty, Nirmala Devi

    Published 2012
    “…The programming language that is used to write the program is Java Language.…”
    Get full text
    Get full text
    Undergraduates Project Papers
  16. 16

    Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli by Zulkifli, Nur Rasyiqah

    Published 2019
    “…Advanced Encryption Standard algorithm is being used to encrypt the text messaging. …”
    Get full text
    Get full text
    Student Project
  17. 17
  18. 18
  19. 19
  20. 20

    Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer by Ahmad Nezer, Nurul Aqilah

    Published 2017
    “…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. …”
    Get full text
    Get full text
    Thesis