Search Results - (( java application customization algorithm ) OR ( control notification based algorithm ))

  • Showing 1 - 9 results of 9
Refine Results
  1. 1
  2. 2

    A real-time mobile notification system for inventory stock out detection using SIFT and RANSAC by Merrad, Yacine, Habaebi, Mohamed Hadi, Islam, Md Rafiqul, Gunawan, Teddy Surya

    Published 2020
    “…The proposed method is a machine learning based real-time notification system using the exciting Scale Invariant Feature Transform feature detector (SIFT) and Random Sample Consensus (RANSAC) algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    System design for urban vehicle two-way connection monitoring system / Muhammad Haiqal Amiruddin by Amiruddin, Muhammad Haiqal

    Published 2015
    “…When the presence of thieves is detected by the sensor, the control unit is expected to send out notification to the vehicle‟s owner. …”
    Get full text
    Get full text
    Thesis
  4. 4

    DESIGN OF SMART TRAFFIC LIGHT SYSTEM BASED ON INTERNET OF THINGS by MUHAMMAD AMIR AFIQ, MOHAMED

    Published 2018
    “…In this paper, the design of the smart traffic light system is proposed based the Internet of Thing (IoT). The system will provide full advantage for monitoring and controlling a congestion model based on the sensor reading. …”
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  5. 5

    Design of monitoring and control system of electricity power limiter using internet of things by Gunoto, Pamor, Yuliansyah, Toni, Nurdin, M., Hisyamuddin, .

    Published 2025
    “…This report discusses the design of monitoring and control system using Internet of Things (IoT) based power limiter, which is designed to monitor and manage electricity consumption in real-time. …”
    Get full text
    Get full text
    Book Section
  6. 6

    Face recognition based automated student attendance system by Chin, Howard

    Published 2018
    “…The facial images are then classified and recognized based on the best result obtained from the combination of algorithm, enhanced LBP and PCA. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  7. 7

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Incremental learning for large-scale stream data and its application to cybersecurity by Ali, Siti Hajar Aminah

    Published 2015
    “…In Chapter 2, we propose a new algorithm based on incremental Radial Basis Function Network (RBFN) to accelerate the learning in stream data. …”
    Get full text
    Get full text
    Thesis