Search Results - (( affecting implementation case algorithm ) OR ( java application sensor algorithm ))

Refine Results
  1. 1

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…The process begins through the monitoring of plants using sensors connected to the Arduino device. Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    PID control system implementation in embedded system for DC motor speed control by Ariff, Che Mohd Noor

    Published 2008
    “…Three experiments have been done to look how much PID control algorithms affect the performances on driving actual DC motor; P1 algorithm experiment, PD algorithm experiment and PID algorithm experiment. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  3. 3
  4. 4

    Human activity recognition via accelerometer and gyro sensors by Tee, Jia Lin

    Published 2023
    “…To implement the data engineering system proposed, two mobile applications, SensorData and SensorDataLogger with user-friendly interfaces and intuitive functionalities are developed using Java programming language and Android Studio. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  5. 5

    Web Algorithm search engine based network modelling of Malaria Transmission by Eze, Monday Okpoto

    Published 2013
    “…The Hypertext Induced Topical Search (HITS) web search algorithm was adapted to implement a search engine, which uses the bipartite contact network as the input. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    An improved firefly algorithm for optimal microgrid operation with renewable energy by Saleh, Syukur

    Published 2017
    “…The IFA method has been implemented using MATLAB software. The results obtained by IFA was compared to FA and other algorithms based on optimal cost, convergence characteristics and robustness to validate the effectiveness of the IFA. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Traffic management algorithms for LEO satellite networks by Huyop @ Ayop, Fahrul Hakim

    Published 2016
    “…Those two algorithms are combined together due to the strong possibilities of being unable to achieve the optimal results when implemented separately. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Cyberbullying detection: a machine learning approach by Yeong, Su Yen

    Published 2022
    “…Machine learning is a hot topic and it is widely implemented in software, web application and more. Those algorithms are used in the classification or regression model to predict an input. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  9. 9

    An improved diabetes risk prediction framework : An Indonesian case study by Sutanto, Daniel Hartono

    Published 2018
    “…In conclusion,DRPF is implementable as prototype and has been highly accepted by Indonesian practitioners as aid for the diagnostics of diabetes.…”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Solar photovoltaic system based on perturb and observe maximum power point tracking with trapezoidal rule approach under partial shading conditions by Altwallbah, Neda Mahmod Mohammad.

    Published 2022
    “…The algorithm is validated using two different methodologies: a simulation model in MATLAB/Simulink and hardware implementation. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Railway shortest path planner application using ant colony optimization algorithm / Muhammad Hassan Firdaus Ruslan by Ruslan, Muhammad Hassan Firdaus

    Published 2017
    “…As train networks expand, routes complexity increases thus indirectly affecting accustomed user. Users are left to their own devices in order to figure out the best route based on their requirements. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Flock optimization algorithm-based deep learning model for diabetic disease detection improvement by Balasubramaniyan, Divager, Husin, Nor Azura, Mustapha, Norwati, Mohd Sharef, Nurfadhlina, Mohd Aris, Teh Noranis

    Published 2024
    “…Hence, the research objective is to create an improved diabetic disease detection system using a Flock Optimization Algorithm-Based Deep Learning Model (FOADLM) feature modeling approach that leverages the PIMA Indian dataset to predict and classify diabetic disease cases. …”
    Get full text
    Get full text
    Article
  14. 14

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. Ultimately, the algorithm development program designed earlier is linked up directly to the robotic model for program implementation and verification. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Prototype development for embedding large amount of information using secure LSB and neural based steganography by Saleh, Basam N.

    Published 2009
    “…This approach is remarkably theoretically efficient, and this approach is the basis of this project to implement a prototype that uses this approach. In this project, for embedding, neural network with adaptive smoothing error back propagation that keeps trying to refine the Stego file until it reaches the best embedding results besides another adaptive Steganography method using concepts called main cases and sub cases. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Error concealment technique using wavelet neural network for wireless transmitted digital images by Al-Azzawi, Alaa Khamees

    Published 2012
    “…In the case, where the missing regions of pixels are containing textures, edges, and other image features that are not easily handled by concealment algorithms. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Analysis and simulation of handoff scenario for wireless communication network / Darul Ridzuan Muhamad Halib by Muhamad Halib, Darul Ridzuan

    Published 2006
    “…It involved a brief study of the various parameters affecting the handoff procedure. It includes a Matlab implementation of the received power (with gaussian noise) versus the distance in the soft handoff case for a mobile moving between two base stations separated by distance d, along a straight line with fixed velocity. …”
    Get full text
    Get full text
    Thesis
  18. 18

    An efficient CSMA-CA algorithm for IEEE 802.15.4 wireless sensor networks by Dahham, Zahraa, Sali, Aduwati, Mohd Ali, Borhanuddin, Jahan, Md. Saukat

    Published 2012
    “…In return, this problem affects the channel utilization and packet collisions. …”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Workload performance evaluation of large spatial database for DSS based disaster management by Rohman, Muhammad Syaifur

    Published 2017
    “…Data recorded in the shortest path analysis process reveals that the evaluation and the prediction on workload performance of shortest path analysis using Dijkstra algorithm has been well implemented. It has been proven that the proposed CBR using Hash Search technique has resulted in an excellent prediction of the accuracy measurement. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    The transmission dynamic of the COVID 19 outbreak : a predictive dashboard by Muhammad Fahmi Ahmad Zuber, Norhayati Rosli, Noryanti Muhammad

    Published 2021
    “…Movement Control Order (MCO) and social distancing which have been implemented as control measures in Malaysia also affected many sectors. …”
    Get full text
    Get full text
    Get full text
    Article