Search Results - (( control notification system algorithm ) OR ( using function based algorithm ))

Refine Results
  1. 1
  2. 2

    DESIGN OF SMART TRAFFIC LIGHT SYSTEM BASED ON INTERNET OF THINGS by MUHAMMAD AMIR AFIQ, MOHAMED

    Published 2018
    “…Traffic light control systems are universally used to monitor and control the flow of the vehicles at the junctions. …”
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  3. 3
  4. 4

    A real-time mobile notification system for inventory stock out detection using SIFT and RANSAC by Merrad, Yacine, Habaebi, Mohamed Hadi, Islam, Md Rafiqul, Gunawan, Teddy Surya

    Published 2020
    “…The proposed method is a machine learning based real-time notification system using the exciting Scale Invariant Feature Transform feature detector (SIFT) and Random Sample Consensus (RANSAC) algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Communication module for urban vehicle two-way connection monitoring device: article / Ahmad Kamil Mohamad Yunus by Mohamad Yunus, Ahmad Kamil

    Published 2015
    “…The action module will cover GPS, GSM, GPRS and camera triggering and interfacing, controlled by an algorithm programmed to suitable microcontroller platform. …”
    Get full text
    Get full text
    Article
  6. 6

    System design for urban vehicle two-way connection monitoring system / Muhammad Haiqal Amiruddin by Amiruddin, Muhammad Haiqal

    Published 2015
    “…When the presence of thieves is detected by the sensor, the control unit is expected to send out notification to the vehicle‟s owner. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Communication module for urban vehicle two-way connection monitoring device / Ahmad Kamil Mohamad Yunus by Mohamad Yunus, Ahmad Kamil

    Published 2015
    “…The action module will cover GPS, GSM, GPRS and camera triggering and interfacing, controlled by an algorithm programmed to suitable microcontroller platform. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Design of monitoring and control system of electricity power limiter using internet of things by Gunoto, Pamor, Yuliansyah, Toni, Nurdin, M., Hisyamuddin, .

    Published 2025
    “…By applying data analysis algorithms, this system is able to provide recommendations for better energy efficiency. …”
    Get full text
    Get full text
    Book Section
  9. 9

    Gravitational search – bat algorithm for solving single and bi-objective of non-linear functions by Abbas, Iraq Tareq

    Published 2018
    “…The BOGS-BAT algorithm is based on three techniques. The first technique is to move or switch solution from single function to functions that contain more than one objective functions. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Design, analysis and fabrication of automatic plant watering system by Donny Osmond, Oxana Sumba

    Published 2024
    “…The main objective of this final year project is to design and implement an Automatic Plant Watering System that utilizes sensor technology and intelligent control algorithms to maintain the ideal moisture levels in the soil. …”
    Get full text
    Get full text
    Student Project
  11. 11

    A block cipher based on genetic algorithm by Zakaria, Nur Hafiza

    Published 2016
    “…In many algorithms which are based on the genetic algorithm approach, diffusion properties using crossover and mutation function are being generated to produce a secure data transmission. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Smart room system with dual authentication by Harun, Muhammad Hazmi, Abdul Rahid@Abdul Rashid, Nurul Najwa

    Published 2025
    “…The face recognition system relies on OpenCV for accurate face detection, capturing face only during system operation, whether a successful or unsuccessful attempt occurs. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13
  14. 14

    FaaSBid: an auction-based model for Function as a Service in edge-fog environments using unallocated resources by Al-Qadhi, Abdulrahman K., Athauda, Rukshan, Latip, Rohaya, Hussin, Masnida

    Published 2026
    “…To initialise function placement, Fitness-Based Swap (FBSW) algorithm is proposed which places functions based on pre-defined information such as function size, function maximum execution time, and storage cost. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Face recognition based automated student attendance system by Chin, Howard

    Published 2018
    “…Hence, we have proposed an automated student attendance system based on face recognition. Face recognition system is very useful in life applications especially in security control systems. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  16. 16

    Computation of cryptosystem based on Lucas functions using addition chain by Md Ali, Zulkarnain, Othman, Mohamed, Md. Said, Mohamad Rushdan, Sulaiman, Md. Nasir

    Published 2010
    “…Cryptosystem based on Lucas Functions is known as LUC Cryptosystem. …”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    An improved fast scanning algorithm based on distance measure and threshold function in region image segmentation by Ismael, Ahmed Naser

    Published 2016
    “…Hence, this study proposes an Improved Fast Scanning algorithm that is based on Sorensen distance measure and adaptive threshold function. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Real time monitoring system for elderly by Wong, Jo Yeng

    Published 2024
    “…The initiative attempted to address common issues like falls, wandering and confusion among senior persons with conditions like dementia or reduced mobility. A Raspberry Pi controlled the system together with a GPS module for accurate location monitoring and fall sensors. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  19. 19

    Enhancing speed performance of the cryptographic algorithm based on the lucas sequence by M. Abulkhirat, Esam

    Published 2003
    “…Utilizing the properties of Lucas functions introduced a public key system based on Lucas functions instead of exponentiation, which offer a good alternative to the most publicly used exponential public key system RSA. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Image encryption algorithm based on chaotic mapping by Salleh, Mazleena, Ibrahim, Subariah, Isnin, Ismail Fauzi

    Published 2003
    “…HVT function is based on a two-dimensional chaotic map that utilized Baker’s map algorithm. …”
    Get full text
    Get full text
    Get full text
    Article