Search Results - (( based detection sensor algorithm ) OR ( program implementation path algorithm ))
Search alternatives:
- program implementation »
- implementation path »
- detection sensor »
- sensor algorithm »
- based detection »
- path algorithm »
-
1
Sensor based line follower self-driving car (sCar) with Obstacles Avoidance
Published 2016“…The CAA will be implemented by C++ programming language. Evaluation results show that CAA calculates collision free path with constant performance which independent on environments.…”
Get full text
Get full text
Get full text
Article -
2
A Development Of An Internet Of Things Equipped Unmanned Ground Vehicle For Surveilance Purpose
Published 2019“…The ultrasonic sensors are programmed in such a way that it sweeps the sensors that the field of view of 180° angle both front and rear of the vehicle. …”
Get full text
Get full text
Monograph -
3
Simulation of shortest path using a-star algorithm / Nurul Hani Nortaja
Published 2004“…The steps to calculate a shortest path using A • algorithm is shown by using appropriate examples and related figures. …”
Get full text
Get full text
Thesis -
4
Vision-based robot indoor navigation
Published 2022“…A navigation robot is built to test the workability and efficiency of the algorithms. In general, the algorithm can provide the nearest path to navigate around the environment without manual assistance. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
5
Wearable based-sensor fall detection system using machine learning algorithm
Published 2021“…In this project, a wearable sensor-based fall detection system using a machine-learning algorithm had been developed. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
6
Implementation of Autonomous Vehicle Navigation Algorithms Using Event-Driven Programming
Published 2012“…By using FSM to describe the behaviour of a navigating mobile robot, an equivalent algorithm can be developed. The algorithm can be relatively easy translated to a suitable program with event-driven programming technique. …”
Get full text
Get full text
Conference or Workshop Item -
7
Multi-sensor fusion based on multiple classifier systems for human activity identification
Published 2019“…In addition, the study suggests a promising potential of hybrid feature selection approach, diversity-based multiple classifier systems to improve mobile and wearable sensor-based human activity detection and health monitoring system. © 2019, The Author(s).…”
Get full text
Get full text
Article -
8
Optimization Of Two-Dimensional Dual Beam Scanning System Using Genetic Algorithms
Published 2008“…This algorithm has been tested and implemented successfully via a dual beam optical scanning system.…”
Get full text
Get full text
Thesis -
9
Implementation of an autonomous mobile robot navigation algorithm using C language
Published 2009“…The problem can basically be divided into positioning and path planning. This report basically discusses the study and also work that has been done from previous of the chosen topic, which is Implementation of an Autonomous Mobile Robot Navigation Algorithm using 'C' language. …”
Get full text
Get full text
Final Year Project -
10
Square groove detection based on forstner with canny edge operator using laser vision sensor
Published 2023“…Therefore, 1he acquired detection results are sufficiently accurate, demonstrating 1he rationale of1he suggested visual sensor's physical design and 1he validity of 1he proposed detection algorithms.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
Development of a user-adaptable human fall detection based on fall risk levels using depth sensor
Published 2018“…There are various approaches used to classify human activities for fall detection. Related studies have employed wearable, non-invasive sensors, video cameras and depth sensor-based approaches to develop such monitoring systems. …”
Get full text
Get full text
Get full text
Article -
12
Development of a user-adaptable human fall detection based on fall risk levels using depth sensor
Published 2018“…There are various approaches used to classify human activities for fall detection. Related studies have employed wearable, non-invasive sensors, video cameras and depth sensor-based approaches to develop such monitoring systems. …”
Get full text
Get full text
Get full text
Article -
13
Implementation of autonomous vehicle navigation algorithms using event-driven programming
Published 2012“…By using FSM to describe the behaviour of a navigating mobile robot, an equivalent algorithm can be developed. The algorithm can be relatively easy translated to a suitable program with event-driven programming technique. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Collision avoidance algorithm design for UAV base on parametric theorem and circle overlapping method / Nur Fadzilah Mohamad Radzi
Published 2013“…The algorithm is based on PTCOT (Parametric Theorem and Circle Overlapping Test) between two UAVs. …”
Get full text
Get full text
Thesis -
15
WSN based intruder detection system based on Territorial Predator Scent Marking Algorithm (TPSMA) sensor node placement scheme
Published 2023Conference Paper -
16
GPS boundary navigation of DrosoBots using MATLAB simulation
Published 2010“…To implement this, region recognition and several path planning algorithms have been utilized. …”
Get full text
Get full text
Proceeding Paper -
17
Observer-based fault detection with fuzzy variable gains and its application to industrial servo system
Published 2020“…The proposed fault detection algorithm employs a fuzzy logic-based approach with the objective of finding the appropriate observer gains that could cope with the different working conditions. …”
Get full text
Get full text
Get full text
Article -
18
Landmark detection for vision based of autonomous guided vehicle
Published 2012“…The landmarks must be detected and recognized by vision sensor accurately in a real-time. …”
Get full text
Get full text
Undergraduates Project Papers -
19
-
20
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Misuse detection algorithms model know attack behavior. They compare sensor data to attack patterns learned from the training data. …”
Get full text
Get full text
Thesis
