Search Results - (( developing program walking algorithm ) OR ( java data normalization algorithm ))
Search alternatives:
- normalization algorithm »
- developing program »
- data normalization »
- walking algorithm »
- program walking »
- java »
-
1
-
2
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…Even a normal people using clustering to grouping their data. …”
Get full text
Get full text
Thesis -
3
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
4
Classification of gait parameters in stroke with peripheral neuropathy (PN) by using k-Nearest Neighbors (kNN) algorithm / N. Anang ...[et al.]
Published 2018“…Additionally, all subjects must be able to walk freely without any cane or mechanical aid during walking. …”
Get full text
Get full text
Get full text
Article -
5
Framework for pedestrian walking behaviour recognition to minimize road accident
Published 2021“…Fourthly, four standard vectors for pedestrian walking behaviour are developed. Fifthly, the performance of the proposed classification methods is validated and evaluated against multiple scenarios and features. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
6
Framework for pedestrian walking behaviour recognition to minimize road accident
Published 2021“…Fourthly, four standard vectors for pedestrian walking behaviour are developed. Fifthly, the performance of the proposed classification methods is validated and evaluated against multiple scenarios and features. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
3D solid robot animation design based on ADAMS
Published 2023“…It is of great significance to propose an efficient and improved inverse kinematics algorithm for the development of robotic bionics in China. …”
Get full text
Get full text
Get full text
Get full text
Article -
8
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Electing the best set of features will help to improve the classifier predictions in terms of the normal and abnormal pattern. The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
Get full text
Get full text
Thesis -
9
Obstacle avoidance legged robot
Published 2008“…A PIC Microcontroller has been implemented to act as a brain for the robot that controls the walking and turning algorithm. Ultrasonic sensor was also developed to act as an ‘eye’ to the system and tells the brain about existence of obstacle in front. …”
Get full text
Get full text
Undergraduates Project Papers -
10
Conference Approval System (e-CoAS) / Nor Hidayah Rahim
Published 2015Get full text
Get full text
Thesis -
11
Development of Hexapod Robot with Manoeuvrable Wheel
Published 2012“…The decisions for the robot to use either wheel or legs are based on the sensory devices and algorithm develops at the controller attached to the robot.…”
Get full text
Get full text
Get full text
Article -
12
Automated pavement imaging program (APIP) for pavement cracks classification and quantification – a photogrammetric approach
Published 2008“…This research is aimed at the development of an Automated Pavement Imaging Program (APIP) for evaluating pavement distress condition. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
Evaluation of cracks and disintegrations using close-range digital photogrammetry and image processing technique
Published 2005“…This research is aimed at the development of an Automated Pavement Imaging Program (APIP) for evaluating pavement distress condition. …”
Get full text
Get full text
Thesis -
14
Development of Hexapod Robot with Manoeuvrable Wheel
Published 2012“…The decisions for the robot to use either wheel or legs are based on the sensory devices and algorithm develops at the controller attached to the robot.…”
Get full text
Get full text
Get full text
Article -
15
Challenges of hidden data in the unused area two within executable files
Published 2009“…The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
Get full text
Get full text
Get full text
Article -
16
Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions
Published 2017“…Two sets of experimental data involving 20 diabetic patients and 20 healthy subjects were collected from CITO laboratory Semarang Central Java, Indonesia. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
17
