Search Results - (( developing models force algorithm ) OR ( java application system algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3
  4. 4

    A microscopic swarm model simulation and fractal approach towards swarm agent behaviour by Widyarto, Setyawan, Abd. Latiff, Muhammad Shafie

    Published 2006
    “…A physical based microscopic agent simulation model has been developed. The developed microscopic agent simulation model is a physical force based model similar to the social force model with forward and repulsion forces as the main force driver. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Real-time algorithmic music composition application. by Yap, Alisa Yi Hui

    Published 2022
    “…In addition, the system also utilises JavaFx and jFugue for its graphical user interface and music programming respectively. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6

    Route Optimization System by Zulkifli, Abdul Hayy

    Published 2005
    “…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
    Get full text
    Get full text
    Final Year Project
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11

    Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework by Asaad Aref, Ibrahim

    Published 2004
    “…Java Media Framework library and the RTP protocol for audio transmission were used as development tools.The developed system designed in this thesis together with experimental results proved that the system could be implemented successfully. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    Improved abnormal detection using self-adaptive social force model for visual surveillance by Wan Nur Azhani, W. Samsudin

    Published 2017
    “…In this work, we aim to find the significant interaction forces and detect the abnormality in the crowd by using Self-Adaptive Social Force Model. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Calibration of optical based silicone tactile sensor based on image deformation technique / Abdul Halim Esa by Esa, Abdul Halim

    Published 2016
    “…Based on these three parameters, three different types of algorithm are developed in order to measure experimentally the forces and deformation based on optical information of the tactile sensor. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Performance comparison between skyhook and semi active damping force estimator (SADE) algorithms for semi active suspension system / S. A. Abu Bakar ... [et al.] by Abu Bakar, S. A., Abdul Majid, M. M., Mansor, S., Abdul Hamid, M.K., Daud, Z.C.

    Published 2018
    “…The Skyhook and Semi Active Damping Force Estimator (SADE) algorithms are used to control the operation of the MR damper in quarter car model’s suspension system. …”
    Get full text
    Get full text
    Article
  16. 16

    Mathematical modelling of mass transfer in a multi-stage rotating disc contactor column by Maan, Normah

    Published 2005
    “…In this study, the development of an improved forward and inverse models for the mass transfer process in the Rotating Disc Contactor (RDC) column were carried out. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Mathematical modelling of mass transfer in multi-stage rotating disc contactor column by Arshad, Khairil Anuar, Talib, Jamalludin, Maan, Normah

    Published 2006
    “…In this study, the development of an improved forward model for the mass transfer process in the Rotating Disc Contactor (RDC) column was carried out. …”
    Get full text
    Get full text
    Get full text
    Monograph
  18. 18

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Node placement optimization using extended virtual force and cuckoo search algorithm in wireless sensor network by Puteri Azwa, Ahmad

    Published 2014
    “…This study proposed Extended Virtual Force and Cuckoo Search (EVFCS) algorithm with a combination of EVFA and CS algorithm to find an optimal node placement. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Network game (Literati) / Chung Mei Kuen by Chung, Mei Kuen

    Published 2003
    “…The possible applications of multimedia-networked system are endless, as the demand to support interactive communication among groups of users has increased significantly. …”
    Get full text
    Get full text
    Thesis