Search Results - (( web application ((growth algorithm) OR (bat algorithm)) ) OR ( _ application force algorithm ))
Search alternatives:
- application force »
- growth algorithm »
- web application »
- force algorithm »
- bat algorithm »
-
1
Development of a Web Access Control Technique Based User Access Behavior
Published 2004“…Previous studies have not yet designed such a system that is reliable enough for such critical applications. This thesis discusses about designs and develops techniques and algorithms for performing web access control. …”
Get full text
Get full text
Thesis -
2
Task scheduling in cloud computing environment using hybrid genetic algorithm and bat algorithm
Published 2022“…This research will conduct comparison of hybrid Genetic Algorithm and Bat Algorithm (GA-BA) with Genetic Algorithm (GA) and Bat Algorithm (BA). …”
Get full text
Get full text
Get full text
Academic Exercise -
3
Dynamic force-directed graph with weighted nodes for scholar network visualization
Published 2022“…The approach is realized by creating a web-based interface using D3 JavaScript algorithm that allows the visualization to focus on how data are connected to each other more accurately than the conventional lines of data seen in traditional data representation. …”
Get full text
Get full text
Article -
4
-
5
Dynamic modeling by usage data for personalization systems
Published 2009Get full text
Get full text
Conference or Workshop Item -
6
Design and Implementation of Intelligent Interoperability Framework for Heterogeneous Subsystems in Smart Home Environment
Published 2011“…Recent advances in computing and communication technologies paved the growth for applications and heterogeneous subsystems in smart home environment. …”
Get full text
Get full text
Thesis -
7
-
8
Transparency improvement by external force estimation in a time-delayed nonlinear bilateral teleoperation system
Published 2015“…Experimental results confirm the efficiency of the novel control algorithm in position tracking and force reflection.…”
Get full text
Get full text
Article -
9
DNA approach for password conversion generator
Published 2014Get full text
Get full text
Conference or Workshop Item -
10
Content-based recommender system for an academic social network / Vala Ali Rohani
Published 2014“…The rapid growth of Web 2.0 applications, such as blogs and social networks creates rich online information and provides various new sources of knowledge. …”
Get full text
Get full text
Thesis -
11
Virtual Force Algorithm and Cuckoo Search algorithm for node placement technique in wireless sensor network
Published 2013“…Wireless Sensor Network (WSN) has become one of the current technologies in the world of information technology.Coverage and connectivity are the main requirement that reflects the performance and quality of services in WSN applications.In WSN applications with a large scale area, the sensor nodes are deployed randomly in a noninvasive way.The deployment process will cause some issues such as coverage hole and overlapping that reflect to the performance of coverage area and connectivity.Node placement model is constructed to find the optimal node placement.Virtual Force Algorithm (VFA) and Cuckoo Search (CS) algorithm approach for node placement technique is analyzed to find the optimal node placement in order to improve the network coverage and connectivity with a minimum coverage hole and overlapping area.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
-
13
-
14
Active force control with iterative learning control algorithm for a vehicle suspension
Published 2013“…The research focuses on the application of an active force control (AFC) strategy with iterative learning control (ILC) algorithms to compensate for the various introduced road profiles or 'disturbances' in a quarter car suspension system as an improvement to ride comfort performance. …”
Get full text
Get full text
Thesis -
15
A real-time algorithm of optical tactile sensor for surface characterization / Nurul Fathiah Mohamed Rosli
Published 2016“…The overall image analysis technique involves the following algorithms: image acquisition (capturing of images), processing (thresholding, noise filtering and boundary detection) and recognition (force measurement). …”
Get full text
Get full text
Thesis -
16
Labview Based Pid Algorithm Development for Z Motion Control in Atomic Force Microscopy
Published 2015Get full text
Get full text
Final Year Project / Dissertation / Thesis -
17
-
18
Enhancing user authentication for cloud web-based application / Detar Beqo
Published 2018“…Motivated by a number of security experts in cloud computing, we proposed an innovative solution of authentication for cloud web-based applications. We aim to improve on passwords with respect to both usability as well as security. …”
Get full text
Get full text
Get full text
Thesis -
19
Efficient skyline processing algorithm over dynamic and incomplete database
Published 2018Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
20
Autonomous multi satellites assembly in keplerian orbits
Published 2013Get full text
Get full text
Get full text
Proceeding Paper
