Search Results - (( motion estimation force algorithm ) OR ( data communication tool algorithm ))
Search alternatives:
- data communication »
- communication tool »
- force algorithm »
- tool algorithm »
-
1
An adaptive block-based matching algorithm for crowd motion sequences
Published 2018“…For crowd analytics and surveillance systems, motion estimation is an essential first step. Lots of crowd motion estimation algorithms have been presented in the last years comprising pedestrian motion. …”
Get full text
Get full text
Article -
2
An adaptive block-based matching algorithm for crowd motion sequences
Published 2018“…For crowd analytics and surveillance systems, motion estimation is an essential first step. Lots of crowd motion estimation algorithms have been presented in the last years comprising pedestrian motion. …”
Get full text
Get full text
Article -
3
An Adaptive Motion Estimation Algorithm for Irregular Motion of Objects
Published 2014Get full text
Get full text
Conference or Workshop Item -
4
-
5
An adaptive motion estimation algorithm for irregular motion of objects
Published 2014Get full text
Get full text
Conference or Workshop Item -
6
Sensor-less force-reflecting macro–micro telemanipulation systems by piezoelectric actuators
Published 2016“…To eliminate external force measurement, a force estimation algorithm is proposed for the master and slave robots. …”
Get full text
Get full text
Article -
7
Performance comparison between skyhook and semi active damping force estimator (SADE) algorithms for semi active suspension system / S. A. Abu Bakar ... [et al.]
Published 2018“…The Skyhook and Semi Active Damping Force Estimator (SADE) algorithms are used to control the operation of the MR damper in quarter car model’s suspension system. …”
Get full text
Get full text
Article -
8
Improved abnormal detection using self-adaptive social force model for visual surveillance
Published 2017“…Using the attained flow vectors from this stage, interaction force estimation is done based on SFM theory. This experiment is done with the hypothesis that high magnitude of interaction force portrayed the abnormal behavior in a crowd. …”
Get full text
Get full text
Thesis -
9
Crowd behavior monitoring using self-adaptive social force model
Published 2019“…The estimated interaction forces of each particle represent the behavior of the crowd, whether it is normal or abnormal. …”
Get full text
Get full text
Get full text
Get full text
Article -
10
Identification of ground vehicle's aerodynamic derivatives using neural network
Published 2008“…A reliable identification technique is a prerequisite to estimate the aerodynamic side force and the yaw moment. …”
Get full text
Get full text
Get full text
Thesis -
11
Analysis of Data Mining Tools for Android Malware Detection
Published 2019Get full text
Get full text
Get full text
Article -
12
Performance evaluation of compression techniques on scientific dataset / Lam Wai Leong
Published 2006“…Data communication is vital, as the world is getting smaller with the help of Internet. …”
Get full text
Get full text
Thesis -
13
-
14
Computational modeling of running biomechanics in amateur runners
Published 2024“…On the other hand, focusing on muscle activations and joint moments during different running distances and with varying shoe cushioning, the results demonstrated that CMC provided the most accurate muscle force estimations, exhibiting the lowest root mean square error (RMSE) and highest correlation, though at the cost of increased computational time. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
15
Intelligent material handling mobile robot for industrial purpose with active force control capability
Published 2005“…An integrated kinematic and dynamic control with embedded intelligent algorithms were the main approaches employed for the robust motion control of a mobile manipulator (MM) comprising a differentially driven wheeled mobile base platform with a two-link planar arm mounted on top of the platform. …”
Get full text
Get full text
Monograph -
16
FPGA Implementation of Multi-User Detection Genetic Algorithm Tool for SDMA-OFDM Systems
Published 2016“…According to the results obtained from the developed algorithm and implementation tools, a high number of users can be physically possible and provided with support. …”
Get full text
Get full text
Article -
17
Forensic Evaluation of Gutmann and DoD Secure Data Deletion Algorithms
Published 2025Get full text
Get full text
Get full text
Conference or Workshop Item -
18
Vibration-based structural damage detection and system identification using wavelet multiresolution analysis / Seyed Alireza Ravanfar
Published 2017“…Then, the next step is to define the dominant components according to the relative energy distributions of wavelet packet transform (WPT) components of the acceleration responses, and transforming the equations of motion of the system in the time-domain to a reduced representation of the equations of motion based on the WPT. …”
Get full text
Get full text
Get full text
Thesis -
19
-
20
Lightweight authentication technique for secure communication of edge/fog data-centers
Published 2020“…Additionally, the key sharing phase of their algorithm is complex. Therefore, to address the highlighted challenges, this paper proposed a lightweight key escrow-less authentication algorithm that will ensure secure communication of resource-constrained edge data-centres during the load balancing process. …”
Get full text
Get full text
Article
