Search Results - (( java implication tree algorithm ) OR ( based information force algorithm ))
Search alternatives:
- based information »
- information force »
- java implication »
- implication tree »
- force algorithm »
- tree algorithm »
-
1
HAPTIC VISUALIZATION USING VISUAL TEXTURE INFORMATION
Published 2011“…A simple rendering algorithm, i.e. sine wave, produces a more stable force feedback, yet lacks surface details compared to the visual texture information approach.…”
Get full text
Get full text
Thesis -
2
Optical tactile sensor for robotic assisted surface characterization / Amir Abd Latif
Published 2016“…Then, the tactile sensor is attached to the end effector of the CRS Catalyst 5 Robot arm for surface characterisation. Based on the information of the processed images, the result of the surface characterisation with respect to the force value is obtained. …”
Get full text
Get full text
Thesis -
3
An adaptive block-based matching algorithm for crowd motion sequences
Published 2018“…The proposed algorithm is based on block-based matching, particle advection, and social force model. …”
Get full text
Get full text
Article -
4
An adaptive block-based matching algorithm for crowd motion sequences
Published 2018“…The proposed algorithm is based on block-based matching, particle advection, and social force model. …”
Get full text
Get full text
Article -
5
Calibration of optical based silicone tactile sensor based on image deformation technique / Abdul Halim Esa
Published 2016“…The characteristics of the tactile sensor will be analysed according to three parameters namely area, perimeter and diameter of the tactile sensor. Based on these three parameters, three different types of algorithm are developed in order to measure experimentally the forces and deformation based on optical information of the tactile sensor. …”
Get full text
Get full text
Thesis -
6
-
7
Establishment of spectral subtraction-based algorithm for experimental modal analysis under operating condition
Published 2022“…Under the operating condition, the presence of unmeasurable forces causes an error in the transfer function calculation due to incomplete information of input forces. …”
Get full text
Get full text
Thesis -
8
-
9
A new algorithm on Graphical User Authentication (GUA) based on multi-line grids
Published 2010“…Thereafter a comparative analysis of all Recall-Based algorithms based on attack patterns of graphical user authentication is tabulated. …”
Get full text
Get full text
Get full text
Article -
10
Real-time measurement and gait detection algorithm for motion control of active ankle foot orthosis / Aminuddin Hamid
Published 2015“…The position of the ball screw actuators is controlled by using motion controller based on the inputs received from three force sensors embedded in the insole and an encoder attached at the ankle joint. …”
Get full text
Get full text
Thesis -
11
Document clustering for knowledge discovery using nature-inspired algorithm
Published 2014“…As the internet is overload with information, various knowledge based systems are now equipped with data analytics features that facilitate knowledge discovery.This includes the utilization of optimization algorithms that mimics the behavior of insects or animals.This paper presents an experiment on document clustering utilizing the Gravitation Firefly algorithm (GFA).The advantage of GFA is that clustering can be performed without a pre-defined value of k clusters.GFA determines the center of clusters by identifying documents with high force.Upon identification of the centers, clusters are created based on cosine similarity measurement.Experimental results demonstrated that GFA utilizing a random positioning of documents outperforms existing clustering algorithm such as Particles Swarm Optimization (PSO) and K-means.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Two-Phases QR Authentication Algorithm (2PQRA) for Digital Energy and IoT Applications
Published 2023Conference Paper -
13
Securing password authentication using MD5 algorithm
Published 2014“…Process of authentication can be defined as developing a unique mapping process from given password to some other unique information in a defined domain. This project is about to make sure that system integrity is secure by using cryptographic based encryption method.Multi —application usability of password today forcing users to have proper memory aids. …”
Get full text
Get full text
Undergraduates Project Papers -
14
Key generation technique based on triangular coordinate extraction for hybrid cubes
Published 2017“…Cryptographic algorithms play an important role in information security where it ensures the security of data across the network or storage. …”
Get full text
Get full text
Article -
15
Mathematical modelling of mass transfer in a multi-stage rotating disc contactor column
Published 2005“…Based on this formulation, a Mass Transfer of A Single Drop (MTASD) Algorithm was designed, followed by a more realistic Mass Transfer of Multiple Drops (MTMD) Algorithm which was later refined to become another algorithm named the Mass Transfer Steady State (MTSS) Algorithm. …”
Get full text
Get full text
Thesis -
16
Key schedule algorithm based on coordinate geometry of a three-dimensional hybrid cube
Published 2019“…Cryptographic algorithms play an important role in information security where it ensures the security of data across the network or storage. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
17
-
18
Spectral subtraction-based filter for experimental modal analysis under harmonics excitation force
Published 2021“…This parameter is calculated based on the phase information of the reconstructed artificial ambient response. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
19
-
20
CAGDEEP : Mobile malware analysis using force atlas 2 with strong gravity call graph and deep learning
Published 2023“…To leverage the existing static analysis techniques, this study proposes CAGDeep, to reflect deep semantic information of malware samples. The novelty of our study lies in the Force Atlas 2 call graph development to capture malware behavior patterns. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item
