Search Results - (( based application force algorithm ) OR ( _ application new algorithm ))*

Refine Results
  1. 1

    Active force control with iterative learning control algorithm for a vehicle suspension by Rosmazi, Rosli

    Published 2013
    “…The research focuses on the application of an active force control (AFC) strategy with iterative learning control (ILC) algorithms to compensate for the various introduced road profiles or 'disturbances' in a quarter car suspension system as an improvement to ride comfort performance. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3
  4. 4

    A new fair marker algorithm for DiffServ networks by Elshaikh, M.A., Mohamed, Othman, Subramaniam, Shamala, Md. Desa, Jalil

    Published 2008
    “…Internet Engineering Task Force (IETF) has proposed many new technologies to cover the new real time applications which have become very important in today's Internet demands. …”
    Get full text
    Get full text
    Article
  5. 5
  6. 6

    Implication of image processing algorithm in remote sensing and GIS applications by Pathan, Mubeena, Jusoff, Kamaruzaman, Mohd Sood, Alias, Razali, Yaakob, Qureshi, Barkatullah

    Published 2011
    “…The traditional ways of solving the problems, have been replaced, by several new algorithms. The selection of an appropriate algorithm for any given chore is an imperative issue because different algorithms are based on the different concepts. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7
  8. 8

    Design and development of prototype robot gripper for object weight measurement by Almassri, Ahmed M. M.

    Published 2014
    “…Therefore, this study has proposed a robotic gripper prototype with a new configuration of pressure sensor distribution, based on development of grasping algorithm for object’s weight measurement. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10
  11. 11
  12. 12

    Algorithm animation for cryptanalysis of caesar and hill ciphers / Sapiee Haji Jamel and Giuseppina Sherry Sayan by Jamel, Shafie, Sayan, Giuseppina Sherry

    Published 2009
    “…Cryptographic algorithms are usually kept secret and the complexity of each algorithm is based on mathematical or statistical analysis. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13
  14. 14
  15. 15

    Modelling of Crowd Evacuation with Communication Strategy Using Social Force Model by Norhaida, Hussain, Wai Shiang, Cheah

    Published 2022
    “…As mobile crowd steering applications require user interaction during fire evacuation, we have foreseen a gap in current simulation algorithms, which leads to unrealistic simulation. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16
  17. 17

    Fraud detection in telecommunication using pattern recognition method / Mohd Izhan Mohd Yusoff by Mohd Yusoff, Mohd Izhan

    Published 2014
    “…The new algorithm is tested on simulated and real data where the results show it is capable of detecting fraud activities. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Multi agent quality of service routing based on scheme ant colony optimization algorithm by Baygi, Maassoumeh Javadi

    Published 2014
    “…Moreover, the proposed approach outperforms the WSP and SWP algorithms, where network efficiency in saturated load gains an 8.39% improvement while the satisfaction of delay and jitter constraints for time critical applications are also achieved. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Development of a building energy analysis package (BEAP) and its application to the analysis of cool thermal energy storage systems by Senawi, M. Y.

    Published 2001
    “…A library building is used as a simulation model to demonstrate the application of the new package for simulating CTES systems. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Novel techniques for voltage stability assessment and improvement in power system / Ismail Musirin. by Musirin, Ismail

    Published 2004
    “…These algorithms have profoundly reduced the computation burden experienced in the conventional technique. …”
    Get full text
    Get full text
    Thesis