Search Results - (( affecting implementation sensor algorithm ) OR ( java implementation learning algorithm ))

Refine Results
  1. 1

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    DEVELOPMENT OF NODE RELIABILITY DETECTION ALGORITHM FOR WIRELESS SENSOR NETWORKS by AZMAN, MOHAMAD AFIQ

    Published 2014
    “…The proposed algorithm is then implemented on hardware compounding of several IRIS sensor motes. …”
    Get full text
    Get full text
    Final Year Project
  3. 3

    DEVELOPMENT OF NODE RELIABILITY DETECTION ALGORITHM FOR WIRELESS SENSOR NETWORKS by AZMAN, MOHAMAD AFIQ

    Published 2014
    “…The proposed algorithm is then implemented on hardware compounding of several IRIS sensor motes. …”
    Get full text
    Get full text
    Final Year Project
  4. 4

    Implementation and analysis of an updating data strategy on iot-waspmote gases testbed with 2.4 ghz xbee for air quality application by Alduais, N.A.M., Abdullah, Noryusliza, Abdullah, J, Jamil, A, H. Y. Saad, Abdul-Malik

    “…The experimental results indicate that the EDCD algorithm performance is affected by the type of sensor as well as the sensing area/location. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Efficient k-coverage scheduling algorithms for wireless sensor networks / Ahmed Abdullah Saleh Al-Shalabi by Saleh Al-Shalabi, Abdullah

    Published 2014
    “…An efficient k-coverage algorithm for sensors with fixed sensing range (Maximum Layers Scheduling algorithm - MLS) is demonstrated. …”
    Get full text
    Get full text
    Thesis
  6. 6

    An Educational Tool Aimed at Learning Metaheuristics by Kader, Md. Abdul, Jamaluddin, Jamal A., Kamal Z., Zamli

    Published 2020
    “…Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Node placement optimization using extended virtual force and cuckoo search algorithm in wireless sensor network by Puteri Azwa, Ahmad

    Published 2014
    “…In EVFCS, the algorithm searches the best value of threshold distance and relocated the new position of sensor nodes. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment by Ruzita, Ahmad

    Published 2013
    “…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Abnormal data detection model based on autoencoder and random forest algorithm: camera sensor data in autonomous driving systems by Shengwen, Geng, Osman, Mohd Hafeez

    Published 2025
    “…In the field of autonomous driving, abnormal data will directly affect the safety of autonomous driving systems, especially in terms of abnormal camera sensor data. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Hardware development of autonomous mobile robot based on actuating lidar by Mohd Romlay, Muhammad Rabani, Mohd Ibrahim, Azhar, Toha, Siti Fauziah, Rashid, Muhammad Mahbubur, Ahmad, Muhammad Syahmi

    Published 2022
    “…From here, the extracted values are implied on k-NN, Decision Tree and CNN training algorithm. The final result shows promising potential with 91% prediction when implemented on the Decision Tree algorithm based on our proposed system of a single actuating LiDAR sensor.…”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Improving Channel Assignment for Vehicular Ad-hoc Sensor Network in Disaster Management System by Chiu Shoon, Sia

    Published 2024
    “…LTE-A Improved Channel (LTE-AIC) was suggested and implemented with proposed algorithms and methods to compare with conventional LTE-A and LTE as a benchmark. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Vision Based Multi Sensor Feedback System For Robot System With Intelligent by Syed Mohamad Shazali, Syed Abdul Hamid

    Published 2009
    “…One of the advantages of this research is that it only uses a low resolution camera and image processing software generated by the algorithms itself without additional sensors such as sonar or IR sensor. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
    Get full text
    Get full text
    Thesis
  16. 16

    MINIATURE SURFACE TRACING DEVICE FOR SURGICAL GUIDANCE AND NAVIGATION by MOHD YUSOFF, MUHAMMAD AIZAT

    Published 2018
    “…These sensors will help the system to trace the movement during 3D surface mapping process. …”
    Get full text
    Get full text
    Final Year Project
  17. 17

    Data transmission in wireless sensor network with greedy function and particle swarm optimization by Hamzarul Alif Hamzah, Norah Tuah, Kit Guan Lim, Min Keng Tan, Lei Zhu, Kenneth Tze Kin Teo

    Published 2019
    “…For this research, Wireless Sensor Network (WSN) is proposed to be implemented in precision farming to act as a decision support system for the farmers. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceedings
  18. 18

    Optimization Method Using Modified Harmony Search For Coverage And Energy Efficiency In Wireless Sensor Network by Halim, Nurul Hamimi

    Published 2018
    “…Coverage and energy efficiency metrics are two fundamental issues for almost all types of application in wireless sensor network (WSNs).Coverage reflects how well an area is monitored by sensor nodes and in energy efficient networks where less energy is consumed to provide the same level of services.These twin specifics are presented to evaluate the performance of a wireless sensor network.Due to its simplicity and ease of analysis,full coverage is widely implemented in many theoretical studies.However,sometimes full coverage is not the best way to represent some real-world application due to its strong restrictions and its deterministic characteristics.In this thesis,Modified Harmony Search algorithm (MHS) is proposed to achieve a sensor node deployment such that the covered area is optimal and data transfer has low energy consumption.Through computer simulations, experimental results verified that the proposed method improved the coverage of area in compare to some related methods.Based on the result obtain from every experiments,coverage area percentage performance is affected by the number of hotspots.This is shown by Harmony Search (HS) based method where the coverage area percentage increases as the number of hotspot increase. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
    Get full text
    Get full text
    Thesis
  20. 20