Search Results - (( _ application tools algorithm ) OR ( ((vr application) OR (its application)) means algorithm ))*

Refine Results
  1. 1
  2. 2

    Optimization of multi-holes drilling toolpath using tiki-taka algorithm by Norazlina, Abdul Rahman

    Published 2024
    “…A computational experiment was conducted on 12 test problems across small, medium, and large problem categories using the TTA, then compared with Genetic Algorithm (GA), Particle Swarm Optimization (PSO), Ant Colony Optimization (ACO), Crayfish Optimization Algorithm (COA), and Geometric Mean Optimizer (GMO). …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4
  5. 5
  6. 6

    Design of super twisting algorithm for chattering suppression in machine tools by Chiew, Tsung Heng, Jamaludin, Zamberi, Bani Hashim, Ahmad Yusairi, Abdullah, Lokman, Rafan, Nur Aidawaty

    Published 2017
    “…An extension of this technique is the addition of super twisting algorithm that suppresses the chattering effect commonly observed with sliding mode control application. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  7. 7
  8. 8
  9. 9
  10. 10

    Safe experimentation dynamics algorithm for data-driven PID controller of a class of underactuated systems by Nor Sakinah, Abdul Shukor

    Published 2019
    “…Due to the problem of the unmodeled dynamics, there is a significant disparity between the theory of control and its actual applications, which makes the model-based controller difficult to apply. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Safe experimentation dynamics algorithm for data-driven PID controller of a class of underactuated systems by Nor Sakinah, Abdul Shukor

    Published 2019
    “…Due to the problem of the unmodeled dynamics, there is a significant disparity between the theory of control and its actual applications, which makes the model-based controller difficult to apply. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Artificial neural network model for predicting windstorm intensity and the potential damages / Mohd Fatruz Bachok by Bachok, Mohd Fatruz

    Published 2019
    “…The other 11 prediction processes which utilised ANN model algorithms (fitting tool), gave R-values for all the algorithms higher than 0.900 except one algorithm equal to 0.8661, meanwhile MSE between 0.22 to 116.41. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14
  15. 15
  16. 16

    Integrated reconstruction of 2D overlapping coronary artery from x-ray angiography with 3D virtual myocardial model using non-rigid iterative closest point algorithm by Omar, Mahmood Mohammed Ali

    Published 2019
    “…On the other hand, a three-dimensional (3D) image of these arteries will give a more precise pictorial view and facilitate a better understanding of its associated diseases. This motivates the 3D reconstruction of real coronary arteries superimposed on a 3D virtual heart model using a non-rigid iterative closest point algorithm, which is the focus of this thesis. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Power system harmonics estimation using LMS, LMF and LMS/LMF by Alhaj, H.M.M., Nor, N.M., Asirvadam, V.S., Abdullah, M.F.

    Published 2014
    “…Least Mean Square (LMS) is simple and popular algorithm that has been applied in many applications, but, noise can affect its performance. …”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18
  19. 19
  20. 20

    Real-time vehicle counting using custom YOLOv8n and DeepSORT for resource-limited edge devices by Saadeldin, Abuelgasim, Rashid, Muhammad Mahbubur, Shafie, Amir Akramin, Hasan, Tahsin Fuad

    Published 2024
    “…Recently, there has been a significant increase in the use of deep learning and low-computing edge devices for analysis of video-based systems, particularly in the field of intelligent transportation systems (ITS). One promising application of computer vision techniques in ITS is in the development of low- computing and accurate vehicle counting systems that can be used to eliminate dependence on external cloud computing resources. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article