Search Results - (( based interpolating path algorithm ) OR ( java application matching algorithm ))
Search alternatives:
- application matching »
- based interpolating »
- interpolating path »
- java application »
- path algorithm »
-
1
STEP-NC Interpolator for General 2D and 3D Parametric Curve / Dzullijah Ibrahim...[et al.]
Published 2017“…A hierarchical-based algorithm is used to extract the tool path data from STEP-NC tool path file of a product model. …”
Get full text
Get full text
Article -
2
-
3
Real-time interpolator of CNC parametric curves with chord-error and feed-rateconstraints
Published 2025“…Teardrop 2-dimensional NURBS curve was selected based on varying features, shapes and dimensions. …”
Get full text
Get full text
Get full text
Article -
4
A new hybrid multiaxial fatigue life model based on critical plane continuum damage mechanics and genetic algorithm
Published 2015“…Interpolation scheme based on the multiaixality of stresses is suggested for the determination of coefficients of the model for different loading paths. …”
Get full text
Get full text
Thesis -
5
A safe overtaking control scheme for autonomous vehicles using rapid-exploration random tree
Published 2022“…The rough path is optimized by applying the cubic spline interpolation method to solve the problem that the path cannot be applied to the actual vehicle driving task. …”
Get full text
Get full text
Get full text
Get full text
Proceedings -
6
Simulation of spline based NC- manufacturing of plastic optical components
Published 2011“…The paper discusses about the precision of manufacturing aspheric surfaces based on spline interpolation method. Splines are used in defining the tool path of an NC-machine in order to improve the precision. …”
Get full text
Get full text
Conference or Workshop Item -
7
Image Fusion for Travel Time Tomography Inversion
Published 2015“…The travel time tomography technology had achieved wide application, the hinge of tomography was inversion algorithm, the ray path tracing technology had a great impact on the inversion results. …”
Get full text
Get full text
Article -
8
-
9
-
10
Message based random variable length key encryption algorithm.
Published 2009Get full text
Get full text
Article -
11
Securing cloud data system (SCDS) for key exposure using AES algorithm
Published 2021“…The AES algorithm has its own structure to encrypt and decrypt sensitive data that make the attackers difficult to get the real data when encrypting by AES algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
-
13
An Agent-Based System with Personalization and Intelligent Assistance Services for Facilitating Knowledge Sharing
Published 2006“…The main algorithms used are profile determination and user similarity. …”
Get full text
Get full text
Thesis -
14
Development of mapping methods for seagrass meadows in Malaysia by using landsat images
Published 2015“…The next study was focused on assessment of the geometric and radiometric fidelity of images reconstructed by three potential gap-filling methods: (1) Geostatistical Neighbourhood Similar Pixel Interpolator (GNSPI), (2) Weighted linear regression algorithm integrated with Laplacian prior regularization, and (3) Local Linear Histogram Matching methods. …”
Get full text
Get full text
Thesis
