Search Results - (( based interactive force algorithm ) OR ( java implementation during algorithm ))

Refine Results
  1. 1

    Improved abnormal detection using self-adaptive social force model for visual surveillance by Wan Nur Azhani, W. Samsudin

    Published 2017
    “…Using the attained flow vectors from this stage, interaction force estimation is done based on SFM theory. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Pairwise testing tools based on hill climbing algorithm (PTCA) by Lim, Seng Kee

    Published 2014
    “…The actual implementation of the algorithm which is in Java programming language, the program is implemented on Net Bean 7.0.1. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  3. 3

    Design of nonlinear adaptive interaction algorithm controller for improvement of tracking performance of X-Y table ball screw drive system by Retas, Zain

    Published 2023
    “…The contribution is Nonlinear Adaptive Interaction Algorithm (NAIA). The controller is developed based on the enhancement and modification of the basic Adaptive Interaction Algorithm Controller (AIA). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    The development of deformable bodies collision response algorithm for interactive virtual environment by Mohd. Shuaib, Norhaida, Bade, Abdullah, Daman, Daut, Sunar, Mohd. Shahrizal

    Published 2006
    “…Assuming no external forces other than concentrated loads, the optimization algorithm succeeded to reduce deformation computation for physical based deformation systems. …”
    Get full text
    Get full text
    Monograph
  5. 5

    Analysis of Motion Detection using Social Force Model by Wan Nur Azhani, W. Samsudin, Kamarul Hawari, Ghazali, Mohd Falfazli, Mat Jusof

    Published 2013
    “…Using the vectors from this method, the interaction forces for each particle in video frames is calculated based on Social Force Model algorithm. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    A microscopic swarm model simulation and fractal approach towards swarm agent behaviour by Widyarto, Setyawan, Abd. Latiff, Muhammad Shafie

    Published 2006
    “…The developed microscopic agent simulation model is a physical force based model similar to the social force model with forward and repulsion forces as the main force driver. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Optical tactile sensor for robotic assisted surface characterization / Amir Abd Latif

    Published 2016
    “…Tactile sensory information is an important design criterion in designing algorithm for robotic manipulation or physical interaction with surrounding environment. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Crowd behavior monitoring using self-adaptive social force model by Wan Nur Azhani, W. Samsudin, Kamarul Hawari, Ghazali

    Published 2019
    “…The current method used is Social Force Model (SFM), which can describe the behavior of a crowd based on the interaction forces between individuals. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    HAPTIC VISUALIZATION USING VISUAL TEXTURE INFORMATION by Adi, Waskito

    Published 2011
    “…The design of the proposed framework involves haptic texture rendering algorithm and query algorithm. The proposed framework integrates computer haptic and content based image retrieval (CBIR) where haptic texture rendering is performed based on extracted cloth data. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Modelling of Crowd Evacuation with Communication Strategy Using Social Force Model by Norhaida, Hussain, Wai Shiang, Cheah

    Published 2022
    “…Although there are algorithms reported for agent-based mobile crowd simulations, not many studies have adopted the social notion during mobile crowd steering simulations. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…The circuits have been designed by proteus, the microcontrollers have been programmed by micro C, and the Graphical User Interface (GUI) has been implemented in Java. Few by electronic components such as RFID, multiplexer, XBee, and servo motors have been used to realize the system. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Optimizing the Social Force Model Using New Hybrid WOABAT-IFDO in Crowd Evacuation in Panic Situation by Hamizan, Sharbini, Roselina, Sallehuddin, Habibollah, Haron

    Published 2022
    “…Thus, this research proposes optimization using the one of the latest nature inspired algorithm namely WOABAT-IFDO (Whale-Bat and Improved Fitness-Dependent Optimization) in the SFM interaction component. …”
    Get full text
    Get full text
    Get full text
    Proceeding
  13. 13

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  14. 14

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…The system is capable in operating an off-line programming method, starting from its programming sequences until robotic implementation of the program. During early stages, the research is emphasis more towards designing a robotic system using RoboLab software and C++ programming language. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    A new estimation of nonlinear contact forces of railway vehicle by Khakoo Mal, Imtiaz Hussain Kalwar, Khurram Shaikh, Tayab Din Memon, Bhawani Shankar Chowdhry, Kashif Nisar, Manoj Gupta

    Published 2021
    “…The core part of any study of rolling stock behavior is the wheel-track interaction patch because the forces produced at the wheel-track interface govern the dynamic behavior of the whole railway vehicle. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Data Hiding Techniques In Digital Images by Al Thloothi, Salah Ramadan

    Published 2003
    “…After all these studies, one of the algorithms in the masking technique is developed and implemented using JAVA program to embed message into true color image with a good quality and higher capacity. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Multi-floor indoor location estimation system based on wireless local area network by Chua, Tien Han

    Published 2007
    “…Before developing the system, study on characteristics of RSS is conducted to help the design, development and implementation of the proposed system. The proposed system is then designed and developed using Java programming language. …”
    Get full text
    Get full text
    Thesis
  18. 18

    STUDIES ON THE NONLINEAR INTERACTIONS ASSOCIATED WITH MOORED SEMI SUBMERSIBLE OFFSHORE PLATFORMS by NOUR ELFADUL ABBAS, YASSIR MOHAMMEDNOUR ELFADUL ABBAS

    Published 2011
    “…For representing the platform to mooring nonlinear interactions, the 6x6 mooring stiffness matrix was derived based on the mooring stiffness and on the fairlead coordinates relative to the structure CG. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  20. 20

    ECG encryption enhancement with multi-layers of AES and DNA computing by Kh-Madhloom, Jamal

    Published 2023
    “…Evaluations of algorithms reveal that the proposed algorithm has achieved a level of security and complexity that is 48 times superior to that of other methods that have been tried and tested. …”
    Get full text
    Get full text
    Get full text
    Thesis