Balanced hierarchical method of collision detection in virtual environment
Determine the successful configuration between rigid bodies that come into contact is always a fundamental problem in computer visualization problem. Given the simulation that needs to maintain the speed of intersection, it is not always fast enough to compute the complete iteration between moving p...
| Main Authors: | Sulaiman, Hamzah Asyrani, Bade, Abdullah |
|---|---|
| Format: | Book Chapter |
| Language: | English |
| Published: |
Springer, 2011
2011
|
| Subjects: | |
| Online Access: | http://eprints.utem.edu.my/id/eprint/4084/ http://eprints.utem.edu.my/id/eprint/4084/1/fulltext.pdf |
Similar Items
The development of deformable bodies collision response algorithm for interactive virtual environment
by: Mohd. Shuaib, Norhaida, et al.
Published: (2006)
by: Mohd. Shuaib, Norhaida, et al.
Published: (2006)
Continuous collision detection for virtual environments: A walkthrough of techniques
by: Sulaiman, Hamzah Asyrani, et al.
Published: (2011)
by: Sulaiman, Hamzah Asyrani, et al.
Published: (2011)
Autonomous Virtual Agent Navigation in Virtual Environments
by: Jaafar, J., et al.
Published: (2010)
by: Jaafar, J., et al.
Published: (2010)
The construction of balanced bounding-volume hierarchies using spatial object median splitting method for collision detection
by: Sulaiman, Hamzah Asyrani, et al.
Published: (2011)
by: Sulaiman, Hamzah Asyrani, et al.
Published: (2011)
Simulating Dynamic Time Dilation in Relativistic Virtual Environment
by: Abbas Saliimi, Lokman, et al.
Published: (2016)
by: Abbas Saliimi, Lokman, et al.
Published: (2016)
Virtual environments in architecture and planning design: 4 possible approaches
by: Mohamed Eshaq, Ahmad Rafi, et al.
Published: (2003)
by: Mohamed Eshaq, Ahmad Rafi, et al.
Published: (2003)
Software Requirement Prioritization Prototype Using Analytical Hierarchical Process (AHP)
by: Rohani, Abu Bakar, et al.
Published: (2014)
by: Rohani, Abu Bakar, et al.
Published: (2014)
Construction of virtual environments through integration of three dimensional (3D) objects / Mohd Fauzi Mustafa
by: Mohd Fauzi, Mustafa
Published: (2004)
by: Mohd Fauzi, Mustafa
Published: (2004)
Virtual congkak
by: Darayani, Musa
Published: (2018)
by: Darayani, Musa
Published: (2018)
Human avatar in virtual environment / Shaiful Baharie Mohd Ali
by: Shaiful Baharie, Mohd Ali
Published: (2004)
by: Shaiful Baharie, Mohd Ali
Published: (2004)
Design of a collaborative system for real time haptic feedback in distributed virtual environments over IP networks
by: Yap, Kian Meng *
Published: (2011)
by: Yap, Kian Meng *
Published: (2011)
Vehicle detection and tracking method
by: Suzana, Mohamed Salleh
Published: (2019)
by: Suzana, Mohamed Salleh
Published: (2019)
Modelling A Knowledge Base Using Object-Oriented Approach For Virtual Learning Environment
by: Mohd Yusof, Mohd Fairuz
Published: (2004)
by: Mohd Yusof, Mohd Fairuz
Published: (2004)
Modelling a Knowledge Base Using Object-Oriented Approach for Virtual Learning Environment
by: Mohd Fairuz Mohd Yusof,
Published: (2004)
by: Mohd Fairuz Mohd Yusof,
Published: (2004)
Data Warehouse Considerations: Investigating Indices And Hierarchical Denormalized Snowflakes (HDS)
by: Zaker, Morteza
Published: (2009)
by: Zaker, Morteza
Published: (2009)
An analysis of hierarchical clustering and neural network clustering for suggestion supervisors and examiners
by: Mohd. Nasir, Nurul Nisa
Published: (2005)
by: Mohd. Nasir, Nurul Nisa
Published: (2005)
Solution of nonlinear cubic-quintic duffing oscillators using harmonic balance method.
by: Hosen, M. A, et al.
Published: (2016)
by: Hosen, M. A, et al.
Published: (2016)
Virtual 3D anatomy / Zulfyza Zainudin
by: Zulfyza, Zainudin
Published: (2003)
by: Zulfyza, Zainudin
Published: (2003)
Phishing attack detection using machine learning method
by: Jupin, John Arthur
Published: (2019)
by: Jupin, John Arthur
Published: (2019)
A novel Intrusion Detection System by using intelligent data mining in WEKA environment
by: Mohammed, Muamer N., et al.
Published: (2011)
by: Mohammed, Muamer N., et al.
Published: (2011)
MGR: An Information Theory Based Hierarchical Divisive Clustering Algorithm for Categorical Data
by: Hongwu, Qin, et al.
Published: (2014)
by: Hongwu, Qin, et al.
Published: (2014)
A Fuzzy Action Selection Method for Virtual Agent Navigation in Unknown Virtual Environments
by: Jaafar, J., et al.
Published: (2008)
by: Jaafar, J., et al.
Published: (2008)
Virtual On-Premise Shopping System with Face Recognition Authentication
by: Yap, Choi Sen, et al.
Published: (2022)
by: Yap, Choi Sen, et al.
Published: (2022)
Java TCP Server Load Balancer: Analysis And Comparison Of Its Load Balancing Algorithms
by: Abu Yan, Mohd Khir
Published: (2008)
by: Abu Yan, Mohd Khir
Published: (2008)
Polymorphism and virtual functions
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Virtual eStore - VeS.com / Tan Hean Giap
by: Tan, Hean Giap
Published: (2001)
by: Tan, Hean Giap
Published: (2001)
UM Virtual Network Computing (UMVNC) / Kok Soo Leong
by: Kok , Soo Leong
Published: (2005)
by: Kok , Soo Leong
Published: (2005)
Virtual directory Mid Valley Megamall / Muzanira Abd Razak
by: Muzanira , Abd Razak
Published: (2004)
by: Muzanira , Abd Razak
Published: (2004)
Virtual hairstyle studio (V-Hair) / Lee Ean Har
by: Lee , Ean Har
Published: (2003)
by: Lee , Ean Har
Published: (2003)
Virtual Multimedia E-tour system / Yong Teik Hwa
by: Yong , Teik Hwa
Published: (2002)
by: Yong , Teik Hwa
Published: (2002)
Real-time denial of service attack detection and mitigation on controller in software defined network environment / Bilal Ishfaq
by: Bilal , Ishfaq
Published: (2016)
by: Bilal , Ishfaq
Published: (2016)
Virtual learning environment
by: Aleshidi, Hamad A., et al.
Published: (2011)
by: Aleshidi, Hamad A., et al.
Published: (2011)
Virtual tour guide software
by: Ching, Yee Sim
Published: (2018)
by: Ching, Yee Sim
Published: (2018)
Virtual Furniture Room Design (ISBN 978-983-2948-22-3)
by: Kwang Hooi, Yew, et al.
Published: (2007)
by: Kwang Hooi, Yew, et al.
Published: (2007)
Methods of intrusion detection in information security incident detection: a comparative study
by: Tan, Fui Bee, et al.
Published: (2018)
by: Tan, Fui Bee, et al.
Published: (2018)
Scale-space segment growing for hierarchical detection of biliary tree structure
by: LOGESWARAN, RAJASVARAN
Published: (2005)
by: LOGESWARAN, RAJASVARAN
Published: (2005)
A hybrid technique using minimal spanning tree and analytic hierarchical process to improve functional requirements prioritization
by: Yaseen, Muhammad
Published: (2021)
by: Yaseen, Muhammad
Published: (2021)
Balancing data utility versus information loss in data-privacy protection using k-Anonymity
by: Esmeel, Thamer Khalil, et al.
by: Esmeel, Thamer Khalil, et al.
Real Time Water Level Detection Systems for Water Treatment Plant
by: Mohd Burhanuddin, Hamzah, et al.
Published: (2016)
by: Mohd Burhanuddin, Hamzah, et al.
Published: (2016)
Automated system architecture for container- based and hypervisor-based virtualization / Muhammad Amin Abdul Razak
by: Muhammad Amin , Abdul Razak
Published: (2019)
by: Muhammad Amin , Abdul Razak
Published: (2019)
Similar Items
-
The development of deformable bodies collision response algorithm for interactive virtual environment
by: Mohd. Shuaib, Norhaida, et al.
Published: (2006) -
Continuous collision detection for virtual environments: A walkthrough of techniques
by: Sulaiman, Hamzah Asyrani, et al.
Published: (2011) -
Autonomous Virtual Agent Navigation in Virtual Environments
by: Jaafar, J., et al.
Published: (2010) -
The construction of balanced bounding-volume hierarchies using spatial object median splitting method for collision detection
by: Sulaiman, Hamzah Asyrani, et al.
Published: (2011) -
Simulating Dynamic Time Dilation in Relativistic Virtual Environment
by: Abbas Saliimi, Lokman, et al.
Published: (2016)