Search Results - (( java implication tree algorithm ) OR ( based information force algorithm ))

Refine Results
  1. 1

    HAPTIC VISUALIZATION USING VISUAL TEXTURE INFORMATION by Adi, Waskito

    Published 2011
    “…A simple rendering algorithm, i.e. sine wave, produces a more stable force feedback, yet lacks surface details compared to the visual texture information approach.…”
    Get full text
    Get full text
    Thesis
  2. 2

    Optical tactile sensor for robotic assisted surface characterization / Amir Abd Latif

    Published 2016
    “…Then, the tactile sensor is attached to the end effector of the CRS Catalyst 5 Robot arm for surface characterisation. Based on the information of the processed images, the result of the surface characterisation with respect to the force value is obtained. …”
    Get full text
    Get full text
    Thesis
  3. 3

    An adaptive block-based matching algorithm for crowd motion sequences by Kajo, I., Kamel, N., Malik, A.S.

    Published 2018
    “…The proposed algorithm is based on block-based matching, particle advection, and social force model. …”
    Get full text
    Get full text
    Article
  4. 4

    An adaptive block-based matching algorithm for crowd motion sequences by Kajo, I., Kamel, N., Malik, A.S.

    Published 2018
    “…The proposed algorithm is based on block-based matching, particle advection, and social force model. …”
    Get full text
    Get full text
    Article
  5. 5

    Calibration of optical based silicone tactile sensor based on image deformation technique / Abdul Halim Esa by Esa, Abdul Halim

    Published 2016
    “…The characteristics of the tactile sensor will be analysed according to three parameters namely area, perimeter and diameter of the tactile sensor. Based on these three parameters, three different types of algorithm are developed in order to measure experimentally the forces and deformation based on optical information of the tactile sensor. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Establishment of spectral subtraction-based algorithm for experimental modal analysis under operating condition by Che Ku Eddy Nizwan, Che Ku Husin

    Published 2022
    “…Under the operating condition, the presence of unmeasurable forces causes an error in the transfer function calculation due to incomplete information of input forces. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    A new algorithm on Graphical User Authentication (GUA) based on multi-line grids by Lashkari, Arash Habibi, Gani, Abdullah, Sabet, Leila Ghasemi, Farmand, Samaneh

    Published 2010
    “…Thereafter a comparative analysis of all Recall-Based algorithms based on attack patterns of graphical user authentication is tabulated. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Real-time measurement and gait detection algorithm for motion control of active ankle foot orthosis / Aminuddin Hamid by Hamid, Aminuddin

    Published 2015
    “…The position of the ball screw actuators is controlled by using motion controller based on the inputs received from three force sensors embedded in the insole and an encoder attached at the ankle joint. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Document clustering for knowledge discovery using nature-inspired algorithm by Mohammed, Athraa Jasim, Yusof, Yuhanis, Husni, Husniza

    Published 2014
    “…As the internet is overload with information, various knowledge based systems are now equipped with data analytics features that facilitate knowledge discovery.This includes the utilization of optimization algorithms that mimics the behavior of insects or animals.This paper presents an experiment on document clustering utilizing the Gravitation Firefly algorithm (GFA).The advantage of GFA is that clustering can be performed without a pre-defined value of k clusters.GFA determines the center of clusters by identifying documents with high force.Upon identification of the centers, clusters are created based on cosine similarity measurement.Experimental results demonstrated that GFA utilizing a random positioning of documents outperforms existing clustering algorithm such as Particles Swarm Optimization (PSO) and K-means.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12
  13. 13

    Securing password authentication using MD5 algorithm by Siti Nabilah , Mohammad Zain

    Published 2014
    “…Process of authentication can be defined as developing a unique mapping process from given password to some other unique information in a defined domain. This project is about to make sure that system integrity is secure by using cryptographic based encryption method.Multi —application usability of password today forcing users to have proper memory aids. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  14. 14

    Key generation technique based on triangular coordinate extraction for hybrid cubes by Mushtaq, Muhammad Faheem, Jamel, Sapiee, Mohamad, Kamaruddin Malik, Ahmad Khalid, Shamsul Kamal, Mat Deris, Mustafa

    Published 2017
    “…Cryptographic algorithms play an important role in information security where it ensures the security of data across the network or storage. …”
    Get full text
    Get full text
    Article
  15. 15

    Mathematical modelling of mass transfer in a multi-stage rotating disc contactor column by Maan, Normah

    Published 2005
    “…Based on this formulation, a Mass Transfer of A Single Drop (MTASD) Algorithm was designed, followed by a more realistic Mass Transfer of Multiple Drops (MTMD) Algorithm which was later refined to become another algorithm named the Mass Transfer Steady State (MTSS) Algorithm. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Key schedule algorithm based on coordinate geometry of a three-dimensional hybrid cube by Mushtaq, Muhammad Faheem

    Published 2019
    “…Cryptographic algorithms play an important role in information security where it ensures the security of data across the network or storage. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18
  19. 19
  20. 20

    CAGDEEP : Mobile malware analysis using force atlas 2 with strong gravity call graph and deep learning by Nur Khairani, Kamarudin, Ahmad Firdaus, Zainal Abidin, Azlee, Zabidi, Mohd Faizal, Ab Razak

    Published 2023
    “…To leverage the existing static analysis techniques, this study proposes CAGDeep, to reflect deep semantic information of malware samples. The novelty of our study lies in the Force Atlas 2 call graph development to capture malware behavior patterns. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item