Search Results - intelligence based ((((true algorithm) OR (force algorithm))) OR (rsa algorithm))
Search alternatives:
- intelligence based »
- force algorithm »
- true algorithm »
- rsa algorithm »
-
1
Secure Image Steganography Using Encryption Algorithm
Published 2016Get full text
Get full text
Conference or Workshop Item -
2
An Intelligent Active Force Control Algorithm to Control an Upper Extremity Exoskeleton for Motor Recovery
Published 2016“…This paper presents the modelling and control of a two degree of freedom upper extremity exoskeleton by means of an intelligent active force control (AFC) mechanism. The Newton-Euler formulation was used in deriving the dynamic modelling of both the anthropometry based human upper extremity as well as the exoskeleton that consists of the upper arm and the forearm. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
-
4
Designing a new model for Trojan horse detection using sequential minimal optimization
Published 2024Conference Paper -
5
-
6
-
7
New approach of cryptography algorithm for e- mail applications
Published 2005Get full text
Get full text
Conference or Workshop Item -
8
Mobile First-Person Shooter (FPS) Game Using Basic Theta* Algorithm / Muhammad Syurahbil Abd Rohaman
Published 2020“…Even though A* is the most popular algorithm amongst game developers, it's hardly the best algorithm in finding the true shortest path. …”
Get full text
Get full text
Thesis -
9
Active force control with iterative learning control algorithm for a vehicle suspension
Published 2013“…ILC algorithm is implemented into AFC-based control scheme to reduce its complexity and hence faster response, by replacing the use of artificial intelligence (Al) method as proposed by previous researcher. …”
Get full text
Get full text
Thesis -
10
Designing a New Model for Trojan Horse Detection Using Sequential Minimal Optimization
Published 2024“…Based on the experiment conducted, the Sequential Minimal Optimization (SMO) algorithm has outperformed other machine learning algorithms with 98.2 % of true positive rate and with 1.7 % of false positive rate.…”
Proceedings Paper -
11
Quantum-Resistant Cryptography in Cyber Security
Published 2025“…While quantum systems promise advances in science, engineering, and artificial intelligence, they also pose a substantial threat to classical cryptographic techniques such as RSA, ECC, and other widely deployed public-key mechanisms. …”
Get full text
Get full text
Get full text
Get full text
Article -
12
Intelligent material handling mobile robot for industrial purpose with active force control capability
Published 2005“…An integrated kinematic and dynamic control with embedded intelligent algorithms were the main approaches employed for the robust motion control of a mobile manipulator (MM) comprising a differentially driven wheeled mobile base platform with a two-link planar arm mounted on top of the platform. …”
Get full text
Get full text
Monograph -
13
-
14
Friendship Degree and Tenth Man Strategy: A new method for differentiating between erroneous readings and true events in wireless sensor networks
Published 2023“…TMS will check the voters’ replies based on the event’s location. The proposed method will delete erroneous readings, while only the true event reports will be reported. …”
Get full text
Get full text
Article -
15
Online DE optimization for Fuzzy-PID controller of semi-active suspension system featuring MR damper
Published 2022“…The semi-active suspension system outperformed other suspension systems because it contains an intelligent actuator that can give the appropriate force to dissipate unwanted vibration using intelligent and real-time controllers. …”
Get full text
Get full text
Article -
16
Development of a robust intelligent controller for a semi-active car suspension system
Published 2022“…Semi-active suspension systems outperformed passive and active suspension systems because it contains an intelligent actuator that can give the appropriate force to dissipate unwanted vibration using intelligent and real-time controllers. …”
Get full text
Get full text
Thesis -
17
An Intelligent System Approach to the Dynamic Hybrid Robot Control
Published 1996“…Finally, for the hybrid control system the task was decomposed into several individual intelligent control agents, where the task space was split into the position-controlled subspaces, the force-controlled subspaces and the uncertain hyper plane identification subspaces. …”
Get full text
Get full text
Thesis -
18
Adaptive resource allocation algorithms with QoS support based on network conditions using fuzzy logic system for IEEE 802.11n networks / Bakeel Hussein Naji Maqhat
Published 2016“…The second contribution is an efficient bandwidth allocation algorithm for A-MSDU aggregation called Adaptive Scheduling based Embedded Fuzzy (ASEF) system. …”
Get full text
Get full text
Thesis -
19
Enhanced Harris's Hawk algorithm for continuous multi-objective optimization problems
Published 2020“…Harris’s hawk multi-objective optimizer (HHMO) algorithm is a MOSIbased algorithm that was developed based on the reference point approach. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
20
Optimizing the Social Force Model Using New Hybrid WOABAT-IFDO in Crowd Evacuation in Panic Situation
Published 2022“…Finally, validation is conducted based on the proposed crowd evacuation simulation time, which is further based on standard evacuation guidelines and statistical analysis methods.…”
Get full text
Get full text
Get full text
Proceeding
