Search Results - (( process interaction force algorithm ) OR ( java application during algorithm ))
Search alternatives:
- process interaction »
- application during »
- interaction force »
- java application »
- during algorithm »
- force algorithm »
-
1
The development of deformable bodies collision response algorithm for interactive virtual environment
Published 2006“…It is an optimization algorithm that selects small areas for deformation processing based on equilibrium state. …”
Get full text
Get full text
Monograph -
2
Design of nonlinear adaptive interaction algorithm controller for improvement of tracking performance of X-Y table ball screw drive system
Published 2023“…This thesis proposes one new approach and contribution to compensate cutting force disturbances. The contribution is Nonlinear Adaptive Interaction Algorithm (NAIA). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
3
A real-time algorithm of optical tactile sensor for surface characterization / Nurul Fathiah Mohamed Rosli
Published 2016“…The overall image analysis technique involves the following algorithms: image acquisition (capturing of images), processing (thresholding, noise filtering and boundary detection) and recognition (force measurement). …”
Get full text
Get full text
Thesis -
4
HAPTIC VISUALIZATION USING VISUAL TEXTURE INFORMATION
Published 2011“…In the query process, accuracy is determined by the number of feature vector elements, data extraction, and similarity measurement algorithm. …”
Get full text
Get full text
Thesis -
5
Optical tactile sensor for robotic assisted surface characterization / Amir Abd Latif
Published 2016“…Based on the information of the processed images, the result of the surface characterisation with respect to the force value is obtained. …”
Get full text
Get full text
Thesis -
6
Development of finite element model for soil-structure interaction
Published 2014“…In order to develop an efficient ANN system, the required algorithm is built through trial and error procedure and then through this process feed-forward network with back-propagation training function is implemented. …”
Get full text
Get full text
Thesis -
7
-
8
SUDOKU HELPER
Published 2015“…In this paper research, author presents an algorithm to provide a tutorial for any Sudoku player who got stuck during the solving process. …”
Get full text
Get full text
Final Year Project -
9
Developing framework for natphoric computer-aided web-based kansei engineering / Mohammad Bakri Che Haron
Published 2013“…The Natphoric algorithm learns the process done by training with sets of training data from previous KE research works. …”
Get full text
Get full text
Thesis -
10
Molecular Dynamic Simulation of CO2 Absorption into Mixed Aqueous Solutions MDEA/PZ
Published 2017“…The periodic boundary is used to visualize the interaction of molecules of the whole system. The simulation method also involved calculation of force field and time integration algorithm.The results were interpreted in terms of Radial Distribution Function (RDF) analysis. …”
Get full text
Get full text
Get full text
Article -
11
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
12
An Intelligent System Approach to the Dynamic Hybrid Robot Control
Published 1996“…A one-pass smoothing algorithm was used to generate a practical smooth trajectory path in near real time. …”
Get full text
Get full text
Thesis -
13
Computer remote monitoring via mobile phones using socket programming / Samih Omer Fadlelmola Elkhider
Published 2011“…The studies show beyond technical algorithms, physical aspects plays a big rule in client server model. …”
Get full text
Get full text
Thesis -
14
ECG encryption enhancement with multi-layers of AES and DNA computing
Published 2023“…Devices that use the internet of things for DNA sequence testing also require a high level of expertise in the application of public-key cryptography. Using brute force techniques, it is possible, in theory, to decipher any key if one has sufficient processing capacity. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
15
Multi-array sensorised pillowcase as call detection alarm system for in ward tetraplegic patient / Normazlianita Mohamad Alias
Published 2021“…In this study, we utilized off-the-shelf materials to form: i) a fabric-based multiarray pressure sensor system, ii) an acquisition circuit along with interface and signal processing algorithms to acquire and interpret the sensor data. …”
Get full text
Get full text
Get full text
Thesis -
16
-
17
-
18
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
19
Gripping an object based on inspection of slip events for a robotic hand model
Published 2017“…Therefore, an automatic feedback control algorithm is developed to perform re-gripping tasks based on the distance at which an object has slipped. …”
Get full text
Get full text
Get full text
Article -
20
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
Published 2015“…This research work was limited to Java based web applications. In future research, the method can be extended to include other programming languages as well as other similar web application security vulnerabilities.…”
Get full text
Get full text
Thesis
