Search Results - (( developing emerging force algorithm ) OR ( java visualization system algorithm ))

Refine Results
  1. 1

    Visdom: Smart guide robot for visually impaired people by Lee, Zhen Ting

    Published 2025
    “…This report details the development of an autonomous guide robot system for visually impaired individuals using the ROS 2 framework and the Wheeltec R550 Robot platform. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  2. 2

    Web-based RIG performance reporting system using interactive visualization techniques / Amir Hambaly Nasaruddin by Nasaruddin, Amir Hambaly

    Published 2019
    “…D3.js is used as a technology to visualize the result in interactive form or dynamic visualization which is a JavaScript library and Python is a language to program the system. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    A microscopic swarm model simulation and fractal approach towards swarm agent behaviour by Widyarto, Setyawan, Abd. Latiff, Muhammad Shafie

    Published 2006
    “…A physical based microscopic agent simulation model has been developed. The developed microscopic agent simulation model is a physical force based model similar to the social force model with forward and repulsion forces as the main force driver. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Improved abnormal detection using self-adaptive social force model for visual surveillance by Wan Nur Azhani, W. Samsudin

    Published 2017
    “…So, Self-Adaptive SFM is developed in order to estimate a good quality of interaction forces since it is crucial to achieve better abnormal detection, which represents the behavior of the crowd. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Graphical user interface for bounded-addition fuzzy splicing systems and their variants / Mathuri Selvarajoo ... [et al.] by Selvarajoo, Mathuri, Santono, Mohd Pawiro, Fong, Wan Heng, Sarmin, Nor Haniza

    Published 2023
    “…In this research, a graphical user interface is developed to generate all the splicing languages generated by bounded-addition fuzzy splicing systems and their variants. An algorithm is developed using JAVA and Visual Studio Code software in order to replace the time-consuming manual computation of the languages generated by bounded-addition fuzzy DNA splicing systems and their variants.…”
    Get full text
    Get full text
    Article
  7. 7

    Splicing system and their variants with fuzzy algebraic sum / Mohd Pawiro Santono Othman by Othman, Mohd Pawiro Santono

    Published 2023
    “…An algorithm is then developed in JAVA using visual code studio software to replace the time-consuming manual computation of the languages generated by algebraic sum fuzzy splicing systems and their variants. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Development of airbag suit system for motorcyclist by Zainal Abidin, Zulkifli, Razali, Fakhruddin

    Published 2014
    “…The project involved development of a control algorithm for the airbag inflation and performing analysis on the finished prototype. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Simulation Based Analysis of Kinematics, Dynamics and Control of Space Robots by Sultana, Shafina

    Published 1996
    “…In the masterslave control environment study, several considerations were taken into account, like the master and slave arm configuration, telemonitoring force feedback algorithm, and dynamic characteristics of master and slave arm. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Development Of Machine Learning User Interface For Pump Diagnostics by Lee, Zhao Yang

    Published 2022
    “…Build up a user interface by using Visual Studio Code (VSC) to run the coding of Cascading Style Sheet (CSS), Hyper Text Markup Language (HTML) and JavaScript (JS) as a webpage and connect to Azure Machine Learning Model and this will allow the user from using the model from a webpage when they have active internet with any devices.…”
    Get full text
    Get full text
    Monograph
  11. 11

    Tacit knowledge for business intelligence framework using cognitive-based approach by Surbakti, Herison

    Published 2022
    “…The framework was tested on 23 librarians from several university libraries in West Java and Yogyakarta, Indonesia. The algorithm starts with a content targeted interview to identify the list of problems faced by librarians. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Human evacuation movement simulation model: Concepts and techniques by Noor Akma, Abu Bakar, Lim, Siew Mooi, Abdul Majid, Mazlina

    Published 2022
    “…A program with a running algorithm of a computer model is called a computer simulation. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Human evacuation movement simulation model: Concepts and techniques by Noor Akma, Abu Bakar, Lim, Siew Mooi, Abdul Majid, Mazlina

    Published 2022
    “…A program with a running algorithm of a computer model is called a computer simulation. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee by Por, Lip Yee

    Published 2012
    “…Two falsifying authentication methods using: (i) penup event and neighbouring connectivity manipulation; and (ii) partial password selection and metaheuristic randomisation algorithm methods, were proposed. The first and second proposed methods were incorporated into the proposed Background Pass-Go (BPG) system and Visual Identification Protocol Professional (VIP Pro) system respectively. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Development of DNA-based dynamic key-dependent block cipher by Saeed, Auday H.

    Published 2015
    “…Hence, it is necessary to research and develop a secure symmetric cipher algorithm. Since the declaration of Rijndael as AES this cipher has been the target of many attacks, and the attempts to break it are ongoing and even increasing everyday by taking advantage of the rapid development in computing capabilities. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Study on effect of abs control system to the vehicle dynamic behavior during braking on various speed and road condition by Muhamad Zulhilmi, Ismail

    Published 2021
    “…Furthermore, with the development of the mathematical model in this research, various ABS algorithms to improve the effectiveness of ABS on the vehicle can be done in future studies.…”
    Get full text
    Get full text
    Thesis
  18. 18

    Computational methods for self-assembly of DNA nanostructures / Ong Hui San by Ong, Hui San

    Published 2016
    “…Several approaches have been adopted including development of an autonomous tool that incorporated evolutionary optimization algorithm in constructing these heterogeneous DNA shapes and the application of heuristic through undirected graph theory as an annotation schema to produce the connectivity maps. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Al-Istikhlāf framework in the age of artificial intelligence: reclaiming the human identity and responsibility in the digital era by Wan Ismail, Hidayah, Abdelaziz, Berghout

    Published 2025
    “…Artificial intelligence (AI) has emerged as one of the most disruptive forces of the twenty-first century, reshaping cultures, economies, social relations, and even the definition of human intelligence, creativity, and knowledge. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Machine learning application in predicting anterior cruciate ligament injury among basketball players by Longfei, Guo

    Published 2025
    “…Four machine learning algorithms—Random Forest (RF), Support Vector Machine (SVM), eXtreme Gradient Boosting (XGBoost), and Logistic Regression (LR)—were developed to predict ACL injury. …”
    Get full text
    Get full text
    Thesis