Search Results - (( identification implementation path algorithm ) OR ( java application customization algorithm ))

  • Showing 1 - 15 results of 15
Refine Results
  1. 1
  2. 2

    Localization using fingerprint method in emergency situation for indoor navigation system / Felix Ceilomond Samam by Samam, Felix Ceilomond

    Published 2015
    “…Route planning using Dijkstra's algorithm can produce better accuracy and more reliable in indoor environment since the only factor taken into account is the weight for each path.…”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Exploratory Study on Navigation System for Visually Impaired Person by Anuar , Mohamed Kassim, Shukor, Ahmad Zaki

    Published 2013
    “…Path planning algorithm will be implemented in this project to give the shortest path and direction as a navigation guide for visually impaired people. …”
    Get full text
    Get full text
    Article
  5. 5

    Performance Study of Developed SMART EYE for Visually Impaired Person. by Anuar , Mohamed Kassim, Shukor, Ahmad Zaki

    Published 2013
    “…Path planning algorithm will be implemented in this project to give the shortest path and direction as a navigation guide for visually impaired people. …”
    Get full text
    Get full text
    Article
  6. 6

    Design of self-tuning minimum effort active noise control with feedback inclusion architecture by Raja Ahmad, Raja Mohd Kamil, Tokhi, Mohammad Osman

    Published 2009
    “…This switch is closed and opened in sequence generating two transfer functions which are then used in constructing the controller specified by a minimum effort control law. The implementation requires an estimate of the secondary path transfer function which can be identified either online or offline. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Real time nonlinear filtered-x lms algorithm for active noise control by Sahib, Mouayad Abdulredha

    Published 2012
    “…However, unlike the other algorithms, NLFXLMS cannot be implemented in real time. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Efficient relay placement algorithm using landscape aware routing (erpalar) by Onabajo, Olawale Olusegun

    Published 2011
    “…GA is an optimization algorithm that simulates natural selection process as found in nature. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Simulated Kalman Filter with modified measurement, substitution mutation and hamming distance calculation for solving traveling salesman problem by Suhazri Amrin, Rahmad, Zuwairie, Ibrahim, Zulkifli, Md. Yusof

    Published 2022
    “…Lastly, a single-agent variant of SKF and a multi-objective SKF were introduced. SKF algorithms and its variants have been implemented in at least nine areas of applications: drill path optimization, airport gate allocation problem (AGAP), assembly sequence planning (ASP), system identification, feature selection, image template matching, controller tuning, wireless sensor network, and engineering design problem. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Problem Solving by Yahaya, Azizi

    Published 2010
    “…In everyday experiences, these steps may be implemented very flexibly, such that various steps may be repeated, may occur out of sequence, or may be implemented interactively. …”
    Get full text
    Get full text
    Article
  11. 11

    Embedded Dual Band Rfid Based Blood Glucose Monitoring System For Internet Of Medical Things by Hamid, Shabinar Abdul

    Published 2020
    “…To optimize the arrangement of routers for real implementation of the developed system in health facilities, the developed path loss model estimates that the router should be positioned at a distance of 30 m from each other, which agrees with the test results which indicate that the router should be positioned ≤ 40 m in order to achieve the best PDR performance.…”
    Get full text
    Get full text
    Thesis
  12. 12

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Intruder localization wireless sensor network radar design with virtual reference tags by Abdullah, Hadi

    Published 2014
    “…This research designs a WSN (Wireless Sensor Network) algorithm for human intruder localization and path detection. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis