Search Results - (( developing interactive path algorithm ) OR ( java identification system algorithm ))
Search alternatives:
- developing interactive »
- identification system »
- java identification »
- interactive path »
- system algorithm »
- path algorithm »
-
1
Face recognition and identification system (FaceRec) / Khew Jye Huei
Published 2004“…It describes the implementation and functions of a working system that performs the recognition and identification of human faces using the implement algorithms. …”
Get full text
Get full text
Thesis -
2
Biometric identification with limited data set
Published 2019Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
3
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The correctness of the proposed protocol is demonstrated in a simulation model developed in JAVA TCP/IP socket. Next, the proposed protocol is implemented in RFID system including IAIK UHF Demo tag, TagSense Nano-UHF reader and back-end database. …”
Get full text
Get full text
Thesis -
4
Robotic path planning using rapidly-exploring random trees
Published 2013“…This study concerns the implementation of Rapidly-Exploring Random Trees (RRTs) algorithm for an autonomous robot path planning. …”
Get full text
Get full text
Get full text
Thesis -
5
A Novel Path Prediction Strategy for Tracking Intelligent Travelers
Published 2009“…This research aims to develop a novel path prediction system which could keep track of the traveler during temporary shortage of actual positioning data. …”
Get full text
Get full text
Thesis -
6
Path planning methods for autonomous vehicles at intersections: A review
Published 2026“…Overall, this review aims to support the development of AV path planning, ultimately contributing to safer and more efficient autonomous systems in urban environments.…”
Get full text
Get full text
Get full text
Article -
7
Feature extraction: hand shape, hand position and hand trajectory path
Published 2011Get full text
Get full text
Get full text
Book Chapter -
8
Performance analysis of multipath routing based on source routing
Published 2010Get full text
Working Paper -
9
Theoretical study of elliptic drum of vertical spindle cotton picker
Published 2025“…An analytical expression is obtained, and a convenient calculation algorithm is developed to automate the investigation of the influence of the dimensions of drum mechanism parts onthe directional path shape and its dimensions. …”
Get full text
Get full text
Get full text
Get full text
Article -
10
An Agent-Based System with Personalization and Intelligent Assistance Services for Facilitating Knowledge Sharing
Published 2006“…The proposed agent based system is called KSFaci (Knowledge Sharing Facilitator). …”
Get full text
Get full text
Thesis -
11
A microscopic swarm model simulation and fractal approach towards swarm agent behaviour
Published 2006“…The collision avoidance algorithm is influenced by existing algorithm flock which uses the steering behaviour to animate birds. …”
Get full text
Get full text
Get full text
Article -
12
Visdom: Smart guide robot for visually impaired people
Published 2025“…An Android mobile application, developed using Java and the java.net.Socket library, provides an intuitive and accessible user interface for seamless interaction with the robot. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
13
Cloud-Mobi Framework using hybrid AHP-ACO method for Social Interaction and Travel Planning
Published 2013Get full text
Get full text
Conference or Workshop Item -
14
Arfict: Indoor navigation mobile application using augmented reality (AR) for FICT
Published 2025“…Hence, the ARFICT project aims to develop an Augmented Reality (AR)-based indoor navigation system for the FICT building at UTAR, providing a real-time, interactive navigation experience that enhances wayfinding in complex indoor environments. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
15
Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee
Published 2012“…Two falsifying authentication methods using: (i) penup event and neighbouring connectivity manipulation; and (ii) partial password selection and metaheuristic randomisation algorithm methods, were proposed. The first and second proposed methods were incorporated into the proposed Background Pass-Go (BPG) system and Visual Identification Protocol Professional (VIP Pro) system respectively. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
16
An Energy-Efficient Cross-Layer approach for cloud wireless green communications
Published 2017“…The main challenge in WSN is to develop an energy efficient algorithm to minimize energy consumption during transmitting information from deployed sensors up to the cloud resources. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
SnapShare: AI Trained Mobile App to Share Snaps Automatically
Published 2020“…Unfortunately, these developed apps require user’s interaction to identify individuals in the photo. …”
Get full text
Get full text
Get full text
Article -
18
-
19
Design of a swimming small soft robot for underwater applications
Published 2024“…By utilizing flexible materials like Ecoflex, PVC sheets, and plastic films, the study successfully developed a soft robot capable of actuating in water. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
20
