Search Results - (( process interaction force algorithm ) OR ( java application during algorithm ))

Refine Results
  1. 1

    The development of deformable bodies collision response algorithm for interactive virtual environment by Mohd. Shuaib, Norhaida, Bade, Abdullah, Daman, Daut, Sunar, Mohd. Shahrizal

    Published 2006
    “…It is an optimization algorithm that selects small areas for deformation processing based on equilibrium state. …”
    Get full text
    Get full text
    Monograph
  2. 2

    Design of nonlinear adaptive interaction algorithm controller for improvement of tracking performance of X-Y table ball screw drive system by Retas, Zain

    Published 2023
    “…This thesis proposes one new approach and contribution to compensate cutting force disturbances. The contribution is Nonlinear Adaptive Interaction Algorithm (NAIA). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    A real-time algorithm of optical tactile sensor for surface characterization / Nurul Fathiah Mohamed Rosli by Mohamed Rosli, Nurul Fathiah

    Published 2016
    “…The overall image analysis technique involves the following algorithms: image acquisition (capturing of images), processing (thresholding, noise filtering and boundary detection) and recognition (force measurement). …”
    Get full text
    Get full text
    Thesis
  4. 4

    HAPTIC VISUALIZATION USING VISUAL TEXTURE INFORMATION by Adi, Waskito

    Published 2011
    “…In the query process, accuracy is determined by the number of feature vector elements, data extraction, and similarity measurement algorithm. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Optical tactile sensor for robotic assisted surface characterization / Amir Abd Latif

    Published 2016
    “…Based on the information of the processed images, the result of the surface characterisation with respect to the force value is obtained. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Development of finite element model for soil-structure interaction by Shoaei, Mohammad Dalili

    Published 2014
    “…In order to develop an efficient ANN system, the required algorithm is built through trial and error procedure and then through this process feed-forward network with back-propagation training function is implemented. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    SUDOKU HELPER by Abdul Razak, Muhammad Asyraf

    Published 2015
    “…In this paper research, author presents an algorithm to provide a tutorial for any Sudoku player who got stuck during the solving process. …”
    Get full text
    Get full text
    Final Year Project
  9. 9

    Developing framework for natphoric computer-aided web-based kansei engineering / Mohammad Bakri Che Haron by Che Haron, Mohammad Bakri

    Published 2013
    “…The Natphoric algorithm learns the process done by training with sets of training data from previous KE research works. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Molecular Dynamic Simulation of CO2 Absorption into Mixed Aqueous Solutions MDEA/PZ by Noorlisa, Harun, Emyra Ezzaty, Masiren

    Published 2017
    “…The periodic boundary is used to visualize the interaction of molecules of the whole system. The simulation method also involved calculation of force field and time integration algorithm.The results were interpreted in terms of Radial Distribution Function (RDF) analysis. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  12. 12

    An Intelligent System Approach to the Dynamic Hybrid Robot Control by Md. Yeasin, Md. Mahmud Hasan

    Published 1996
    “…A one-pass smoothing algorithm was used to generate a practical smooth trajectory path in near real time. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Computer remote monitoring via mobile phones using socket programming / Samih Omer Fadlelmola Elkhider by Omer Fadlelmola Elkhider, Samih

    Published 2011
    “…The studies show beyond technical algorithms, physical aspects plays a big rule in client server model. …”
    Get full text
    Get full text
    Thesis
  14. 14

    ECG encryption enhancement with multi-layers of AES and DNA computing by Kh-Madhloom, Jamal

    Published 2023
    “…Devices that use the internet of things for DNA sequence testing also require a high level of expertise in the application of public-key cryptography. Using brute force techniques, it is possible, in theory, to decipher any key if one has sufficient processing capacity. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Multi-array sensorised pillowcase as call detection alarm system for in ward tetraplegic patient / Normazlianita Mohamad Alias by Normazlianita, Mohamad Alias

    Published 2021
    “…In this study, we utilized off-the-shelf materials to form: i) a fabric-based multiarray pressure sensor system, ii) an acquisition circuit along with interface and signal processing algorithms to acquire and interpret the sensor data. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17
  18. 18

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Gripping an object based on inspection of slip events for a robotic hand model by Al-Shanoon, Abdulrahman Abdulkareem Sattoori, Ahmad, Siti Anom, Hassan, Mohd Khair

    Published 2017
    “…Therefore, an automatic feedback control algorithm is developed to perform re-gripping tasks based on the distance at which an object has slipped. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications by Hydara, Isatou

    Published 2015
    “…This research work was limited to Java based web applications. In future research, the method can be extended to include other programming languages as well as other similar web application security vulnerabilities.…”
    Get full text
    Get full text
    Thesis