Search Results - (( using interactive force algorithm ) OR ( java application customization algorithm ))

Refine Results
  1. 1

    Improved abnormal detection using self-adaptive social force model for visual surveillance by Wan Nur Azhani, W. Samsudin

    Published 2017
    “…In this work, we aim to find the significant interaction forces and detect the abnormality in the crowd by using Self-Adaptive Social Force Model. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Design of nonlinear adaptive interaction algorithm controller for improvement of tracking performance of X-Y table ball screw drive system by Retas, Zain

    Published 2023
    “…This thesis proposes one new approach and contribution to compensate cutting force disturbances. The contribution is Nonlinear Adaptive Interaction Algorithm (NAIA). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Analysis of Motion Detection using Social Force Model by Wan Nur Azhani, W. Samsudin, Kamarul Hawari, Ghazali, Mohd Falfazli, Mat Jusof

    Published 2013
    “…Using the vectors from this method, the interaction forces for each particle in video frames is calculated based on Social Force Model algorithm. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Crowd behavior monitoring using self-adaptive social force model by Wan Nur Azhani, W. Samsudin, Kamarul Hawari, Ghazali

    Published 2019
    “…It has become a popular research among computer vision communities nowadays due to its needs by the authorities. The current method used is Social Force Model (SFM), which can describe the behavior of a crowd based on the interaction forces between individuals. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    A real-time algorithm of optical tactile sensor for surface characterization / Nurul Fathiah Mohamed Rosli by Mohamed Rosli, Nurul Fathiah

    Published 2016
    “…The overall image analysis technique involves the following algorithms: image acquisition (capturing of images), processing (thresholding, noise filtering and boundary detection) and recognition (force measurement). …”
    Get full text
    Get full text
    Thesis
  6. 6

    A microscopic swarm model simulation and fractal approach towards swarm agent behaviour by Widyarto, Setyawan, Abd. Latiff, Muhammad Shafie

    Published 2006
    “…The collision avoidance algorithm is influenced by existing algorithm flock which uses the steering behaviour to animate birds. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Development of finite element model for soil-structure interaction by Shoaei, Mohammad Dalili

    Published 2014
    “…Since different materials are used in the current SSI problem constitutive models are employed to capture both the linear and nonlinear interactive behavior of all the materials i.e. concrete, steel, soil and interface element. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Optical tactile sensor for robotic assisted surface characterization / Amir Abd Latif

    Published 2016
    “…Tactile sensory information is an important design criterion in designing algorithm for robotic manipulation or physical interaction with surrounding environment. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10
  11. 11

    Homoclinicity in the dynamics of forced fluidized bed catalytic reactors by Abashar, Mohamed E. E., Elnashaie, Said Salah Eldin Hamed, Hughes, R.

    Published 1997
    “…The dynamic behaviour of the non-isothermal oscillating fluidized bed catalytic reactor subjected to high and low frequency forcing is investigated. Resonance horns and period doubling loci inside the horns are constructed, using efficient algorithms, for different positions of the centre of forcing relative to the homoclinical orbit (infinite period orbit) of the autonomous (unforced) system. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Application of inerter in passenger vehicle suspension systems / Soong Ming Foong by Soong, Ming Foong

    Published 2015
    “…In the second part, the use of semi-active switching algorithm on an inerter showed greater ride improvement of up to 12 % than that brought by passive inerter, while the non-linearity which was also modeled as switching law for the inerter managed better sprung mass transient response. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Evaluation of Real-Time Visio-Haptic Deformable Bovine Rectal Palpation Simulator by Ahmad, Irshad, Sulaiman, Suziah

    Published 2010
    “…In this simulator the teacher guides the student in applying forces using force feedback device, when palpating different parts of the reproductive system. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    A new estimation of nonlinear contact forces of railway vehicle by Khakoo Mal, Imtiaz Hussain Kalwar, Khurram Shaikh, Tayab Din Memon, Bhawani Shankar Chowdhry, Kashif Nisar, Manoj Gupta

    Published 2021
    “…The core part of any study of rolling stock behavior is the wheel-track interaction patch because the forces produced at the wheel-track interface govern the dynamic behavior of the whole railway vehicle. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Adaptive mesh refinement immersed boundary method for simulations of laminar flows past a moving thin elastic structure by Aldlemy, M.S., Rasani, M.R., Ariffin, A.K., Ya, T.M.Y.S.T.

    Published 2020
    “…The cut-cell IBM is used to predict the body forces while FEM is used to predict deformation of the thin elastic structure in order to integrate the motions of the fluid and solid at the interface. …”
    Get full text
    Get full text
    Article
  17. 17

    Optimizing the Social Force Model Using New Hybrid WOABAT-IFDO in Crowd Evacuation in Panic Situation by Hamizan, Sharbini, Roselina, Sallehuddin, Habibollah, Haron

    Published 2022
    “…Thus, this research proposes optimization using the one of the latest nature inspired algorithm namely WOABAT-IFDO (Whale-Bat and Improved Fitness-Dependent Optimization) in the SFM interaction component. …”
    Get full text
    Get full text
    Get full text
    Proceeding
  18. 18

    STUDIES ON THE NONLINEAR INTERACTIONS ASSOCIATED WITH MOORED SEMI SUBMERSIBLE OFFSHORE PLATFORMS by NOUR ELFADUL ABBAS, YASSIR MOHAMMEDNOUR ELFADUL ABBAS

    Published 2011
    “…Seakeeping tests were conducted for head and beam model orientations. The measured drift forces were compared to available formulae in the literature to assess the available semi-empirical methods for evaluation these forces. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Development of a software for simulating active force control schemes of a two-link planar manipulator by Mailah, Musa, Poh, Yang Liang

    Published 2005
    “…The Paper Describes The Development Of A Software In The Form Of An Interactive Computer Program That Integrates A Number Of Robotic Control Schemes With The Active Force Control (Afc) Strategy As The Key Element Of The Robotic System That Assumes A Rigid Two-Link Planar Configuration. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    ECG encryption enhancement with multi-layers of AES and DNA computing by Kh-Madhloom, Jamal

    Published 2023
    “…MATLAB 2017b, a reliable simulation method, was utilised throughout the construction and validation of the algorithm. The performance of the recommended approach makes it possible to thwart an attack using brute force considerably more fast than is possible with the encryption technologies that are currently in use. …”
    Get full text
    Get full text
    Get full text
    Thesis