An Intelligent Method. For Processing String In 3-D Based On Its Minimum Energy.
The problems associated with geometrical model of string (rope) in computer graphics are preserving topology and detail shape, and a large data volume in its processing. As an example, we consider string figures construction in Cat's Cradle game [3].
| Main Authors: | Budiarto, Rahmat, Hj. Taib, Abdullah Zawawi, Yusoff, Zaharin, Yamada, Masashi |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English |
| Published: |
2002
|
| Subjects: | |
| Online Access: | http://eprints.usm.my/11778/ http://eprints.usm.my/11778/1/Computational_Intelligence_and_applications_%28P._Saratchandran%29.pdf |
Similar Items
Simple Knit Design System; Using Pattern Matching.
by: Budiarto, Rahmat, et al.
Published: (2002)
by: Budiarto, Rahmat, et al.
Published: (2002)
Intelligent Network-Based Stepping Stone Detection Approach.
by: Omar, Mohd Nizam, et al.
by: Omar, Mohd Nizam, et al.
Security Mechanisms For The Ipv4 To Ipv6 Transition.
by: Hj Mat Taib, Abidah, et al.
Published: (2007)
by: Hj Mat Taib, Abidah, et al.
Published: (2007)
lPv6 Transition: Why A New Security Mechanisms Model Is Necessary.
by: Hj Mat Taib, Abidah, et al.
Published: (2007)
by: Hj Mat Taib, Abidah, et al.
Published: (2007)
Future Internet With IPv6.
by: Budiarto, Rahmat
Published: (2009)
by: Budiarto, Rahmat
Published: (2009)
Selecting A Cyclic Redundancy Check (CRC) Generator Polynomial for CEH (CRC Extension Header).
by: Supriyanto, Supriyanto, et al.
Published: (2009)
by: Supriyanto, Supriyanto, et al.
Published: (2009)
Application Of Exact String Matching Algorithms Towards SMILES Representation Of Chemical Structure.
by: Klaib, Ahmad Fadel, et al.
Published: (2007)
by: Klaib, Ahmad Fadel, et al.
Published: (2007)
Parallel Quick-Skip Search Hybrid Algorithm For The Exact String Matching Problem.
by: Naser, Mustafa Abdulsahib
Published: (2010)
by: Naser, Mustafa Abdulsahib
Published: (2010)
A Study on Techniques for Handling Transmission Error of IPV6 Packets over Fmer Optic Links
by: Budiarto, Rahmat, et al.
Published: (2010)
by: Budiarto, Rahmat, et al.
Published: (2010)
Analogical Learner For Natural Language Processing Based On Structured String-tree Correspondence (sstc) And
Case-based Reasoning
by: Lim, Huan Ngee
Published: (2009)
by: Lim, Huan Ngee
Published: (2009)
A Framework For Detecting Bluetooth Mobile Worms.
by: Sarwar, Usman, et al.
Published: (2007)
by: Sarwar, Usman, et al.
Published: (2007)
Dawn Of The Mobile Malware: Reviewing Mobile Worms .
by: Sarwar, Usman, et al.
Published: (2007)
by: Sarwar, Usman, et al.
Published: (2007)
A Neural Network-Based Application to Identify Cubic Structures in Multi Component Crystalline Materials Using X-Ray Diffraction Data.
by: Syukur, Mohammad, et al.
Published: (2007)
by: Syukur, Mohammad, et al.
Published: (2007)
Color-based Image Retrieval Using Wavelet.
by: Sumari, Putra, et al.
Published: (2004)
by: Sumari, Putra, et al.
Published: (2004)
A New Image-Database Encryption Based on A Hybrid Approach of Data-at-Rest and Data-in-Motion Encryption Protocol.
by: Ooi, Bee Sien, et al.
Published: (2004)
by: Ooi, Bee Sien, et al.
Published: (2004)
Unreliable Network Re-Authentication Protocol Based On Hybrid Key Using CSP Approach.
by: Ramadass, Sureswaran, et al.
Published: (2007)
by: Ramadass, Sureswaran, et al.
Published: (2007)
QoS Mechanism With Probability For IPv6-Based IPTV Network.
by: H.S, Primantara, et al.
Published: (2009)
by: H.S, Primantara, et al.
Published: (2009)
Non-greedy minimum interference routing algorithm for bandwidth-guaranteed flows
by: Tan, Su Wei, et al.
Published: (2002)
by: Tan, Su Wei, et al.
Published: (2002)
An ant colony optimization approach to the degree-constrained minimum spanning tree problem
by: Ewe, HT, et al.
Published: (2005)
by: Ewe, HT, et al.
Published: (2005)
Development Of Penetration Testing Model For Increasing Network Security.
by: Budiarto, Rahmat, et al.
Published: (2004)
by: Budiarto, Rahmat, et al.
Published: (2004)
A Genetic Algorithm Based Approach for Solving
the Minimum Dominating Set of Queens Problem
by: Alharbi, Saad, et al.
Published: (2017)
by: Alharbi, Saad, et al.
Published: (2017)
A Genetic Algorithm Based Approach for Solving the Minimum Dominating Set of Queens Problem
by: Alharbi, Saad, et al.
Published: (2017)
by: Alharbi, Saad, et al.
Published: (2017)
An adaptive minimum bit-error decision-feedback equalizer for UWB systems
by: Chung, Gwo Chin, et al.
Published: (2007)
by: Chung, Gwo Chin, et al.
Published: (2007)
Hybrid Hierarchical Approach For Addressing Service
Discovery Issues In MANETS.
by: Seno, Seyed Amin Hosseini, et al.
Published: (2007)
by: Seno, Seyed Amin Hosseini, et al.
Published: (2007)
Honeypots: Why We Need A Dynamics Honeypots?
by: Budiarto, Rahmat, et al.
Published: (2004)
by: Budiarto, Rahmat, et al.
Published: (2004)
Survey And New Approach In Service Discovery And Advertisement For Mobile Ad Hoc Networks.
by: Seno, Seyed Amin Hosseini, et al.
Published: (2007)
by: Seno, Seyed Amin Hosseini, et al.
Published: (2007)
POSFinger: A New Fingerprint For Passive Remote Operating System Identification.
by: Manasrah, Ahmad, et al.
Published: (2007)
by: Manasrah, Ahmad, et al.
Published: (2007)
High Performance Network Worm Detection Engine Using Memory Efficient Circular Buffer.
by: Budiarto, Rahmat, et al.
Published: (2007)
by: Budiarto, Rahmat, et al.
Published: (2007)
Performance Evaluation Of Unidirectional Lightweight Encapsulation Using ns-2 And DVB-S Testbed.
by: Ang, Way-Chuang, et al.
Published: (2007)
by: Ang, Way-Chuang, et al.
Published: (2007)
AN ENHANCED ANT COLONY OPTIMIZATION METAHEURISTIC FOR THE MINIMUM DOMINATING SET PROBLEM
by: Ho, Chin Kuan, et al.
Published: (2006)
by: Ho, Chin Kuan, et al.
Published: (2006)
Ant Colony Optimization approaches to the degree-constrained minimum spanning tree problem
by: Bau, Yoon Teck, et al.
Published: (2008)
by: Bau, Yoon Teck, et al.
Published: (2008)
Latex glove protein detection using maximum-minimum clustering variation technique
by: Ting, Huong Yong, et al.
Published: (2009)
by: Ting, Huong Yong, et al.
Published: (2009)
A Synchronization Structure Of SSTC And Its Applications In Machine Translation.
by: Al-Adhaileh, Mosler R., et al.
Published: (2002)
by: Al-Adhaileh, Mosler R., et al.
Published: (2002)
Interactivities in music intelligent tutoring system
by: Phon-Amnuaisuk, S., et al.
Published: (2005)
by: Phon-Amnuaisuk, S., et al.
Published: (2005)
Classification of alcohol abusers: An intelligent approach
by: Kanna,, PS, et al.
Published: (2005)
by: Kanna,, PS, et al.
Published: (2005)
S-Cart, Intelligent self check-out trolley in hypermarket.
Creation of value proposition for intelligent self-checkout trolley.
by: Koh, Peik See
Published: (2010)
by: Koh, Peik See
Published: (2010)
TIC : A Topic-Based Intelligent Crawler
by: Baghdadi, Hossein Shahsavand
Published: (2011)
by: Baghdadi, Hossein Shahsavand
Published: (2011)
CSE 401 - ARTIFICIAL INTELLIGENCE SEPT 1997.
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (1997)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (1997)
CSE401 - ARTIFICIAL INTELLIGENCE - APR. 1998
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (1998)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (1998)
CPT244 – Artificial Intelligence June 2018
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2018)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2018)
Similar Items
-
Simple Knit Design System; Using Pattern Matching.
by: Budiarto, Rahmat, et al.
Published: (2002) -
Intelligent Network-Based Stepping Stone Detection Approach.
by: Omar, Mohd Nizam, et al. -
Security Mechanisms For The Ipv4 To Ipv6 Transition.
by: Hj Mat Taib, Abidah, et al.
Published: (2007) -
lPv6 Transition: Why A New Security Mechanisms Model Is Necessary.
by: Hj Mat Taib, Abidah, et al.
Published: (2007) -
Future Internet With IPv6.
by: Budiarto, Rahmat
Published: (2009)