Search Results - (( developing interactive prevention algorithm ) OR ( java optimization sensor algorithm ))

  • Showing 1 - 13 results of 13
Refine Results
  1. 1

    SecPath: Energy efficient path reconstruction in wireless sensor network using iterative smoothing by Abd, Wamidh Jwdat

    Published 2019
    “…Wireless sensor networks operate through commonly self-organized sensor nodes to transfer data in a multi-hop approach to a central sink. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Energy efficient path reconstruction in wireless sensor network using iPath by Hasan, Sazlinah, Abd, Wamidh Jwdat, Ariffin, Ahmad Alauddin

    Published 2019
    “…Wireless sensor networks operate through commonly self-organized sensor nodes to transfer data in a multi-hop approach to a central sink. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions by Saraswati, Galuh Wilujeng

    Published 2017
    “…The project has also implemented the optimization process onto the proposed ANFIS model through the hybrid of Genetic Algorithm on the fuzzy membership function of the ANFIS model. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Development of an effective clustering algorithm for older fallers by Goh, Choon Hian, Wong, Kam Kang, Tan, Maw Pin *, Ng, Siew Cheok, Chuah, Yea Dat, Kwan, Ban Hoe

    Published 2022
    “…The purpose of this study was, therefore, to develop a clustering-based algorithm to determine falls risk. …”
    Get full text
    Get full text
    Article
  5. 5

    Development of efficient t-way test data generation algorithm and execution strategies by Khandakar Fazley, Rabbi

    Published 2012
    “…R2Way outperforms other existing strategies but cannot support higher interaction level (T > 2). And finally, (IV) MTTG (Multi-Tuple based T-way Test Data Generation) strategy is developed inspiring kids “Card Game” to overcome the limitations of interaction strength. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Accident Prevention Block to Move an Automobile From Traffic Collision by Rajiv, Charles Samuel

    Published 2019
    “…In the present work, an attempt has been made to propose an accident prevention block in automobiles that can sense the tired/sleepy driver via a camera and algorithms, to maneuver the vehicle to safety. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    All-in-1 adverse drug reaction reporting system / Long Chiau Ming … [et al.] by Chiau Ming, Long, Karuppannan, Mahmathi, Abdul Wahab, Izyan, Abd Wahab, Mohd Shahezwan, Zulkifly, Hanis Hanum

    Published 2014
    “…In a later stage of this project, we could quantify the risk factors for ADR and drug interaction and develop a predictive model which links drug interaction with ADR.…”
    Get full text
    Get full text
    Get full text
    Book Section
  8. 8

    Crowd behavior monitoring using self-adaptive social force model by Wan Nur Azhani, W. Samsudin, Kamarul Hawari, Ghazali

    Published 2019
    “…This work aims to develop a crowd behavior monitoring system using Self-Adaptive SFM. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  9. 9
  10. 10

    3D Face Analysis using Tensor Approach by Suriani, Ab Rahman

    Published 2022
    “…Early studies in face research used matrix-based and vector-based algorithms to represent faces. According to studies, these methods have the potential to prevent the loss of critical and significant data, which could lead to lower recognition performance. …”
    Get full text
    Get full text
    Thesis
  11. 11

    A conceptual anonymity model to ensure privacy for sensitive network data by Arafat, N.H.M., Pramanik, Md Ileas, Abu Jafar, Md Muzahid, Lu, Bibo, Jahan, Sumaiya, Murad, Saydul Akbar

    Published 2021
    “…The growing popularity of this industry, as well as the required development of data sharing tools and technology, pose major threats to an individual's sensitive information privacy. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Monitoring cathodic protection system for underground pipeline by Thai, Seng Choong

    Published 2013
    “…In this research, a software algorithm is created to be able to sense the readings of drain point, shunt current, transformer rectifier voltage, temperature, humidity and to response to multiple levels of CP malfunctions using interactive graphical method and mapping system. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Depression Detection in Tweets from Urban Cities of Malaysia using Deep Learning by Priya Sri, E.K., Savita, K.S., Zaffar, M.

    Published 2021
    “…Therefore, the research entails on how the problem statement of this project on developing an algorithm that can predict text- based depression symptoms using deep learning and Natural Language Processing (NLP) can be achieved. …”
    Get full text
    Get full text
    Conference or Workshop Item