Search Results - (( java application path algorithm ) OR ( changes evaluation sensor algorithm ))

Refine Results
  1. 1

    Smart appointment organizer for mobile application / Mohd Syafiq Adam by Adam, Mohd Syafiq

    Published 2009
    “…In creating this application, NetBeans IDE 6.5and Java Micro Edition (Java ME) are used. …”
    Get full text
    Get full text
    Thesis
  2. 2

    A wireless interference-aware internet-of-things gateway placement framework with genetic algorithm approach by Kong, Zan Wai

    Published 2022
    “…However, there is no existing gateway placement scheme that considers all the factors of number of gateways, sensor nodes coverage, lateral bound (inter-gateway) connections, redundancy for fault tolerance and dynamic changes of sensor nodes’ location. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  3. 3

    Visdom: Smart guide robot for visually impaired people by Lee, Zhen Ting

    Published 2025
    “…The system architecture integrates ROS 2 on a Raspberry Pi, with TCP/IP connectivity enabling remote operation. An Android mobile application, developed using Java and the java.net.Socket library, provides an intuitive and accessible user interface for seamless interaction with the robot. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  4. 4

    Visdom: Smart guide robot for visually impaired people by Lee, Zhen Ting

    Published 2025
    “…The system architecture integrates ROS 2 on a Raspberry Pi, with TCP/IP connectivity enabling remote operation. An Android mobile application, developed using Java and the java.net.Socket library, provides an intuitive and accessible user interface for seamless interaction with the robot. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  5. 5

    A dynamic energy savvy routing algorithm for mobile Ad-hoc and sensor networks by Mohamad Nazim, Jambli, Adnan Shahid, Khan, Halikul, Lenando, Jiwa, Abdullah, Sinarwati, Mohamad Suhaili

    Published 2017
    “…In MASNETs, the network topologies are frequently change due to the moving sensor nodes that have low radio frequency coverage which make the design and implementation of a routing protocol in this networks very challenging. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Pose estimation algorithm for mobile Augmented Reality based on inertial sensor fusion by Alam, Mir Suhail, Morshidi, Malik Arman, Gunawan, Teddy Surya, Olanrewaju, Rashidah Funke, Arifin, Fatchul

    Published 2021
    “…We evaluated the performance of augmenting the 3D object using the techniques, vision-based, and incorporating the sensor data using the video data. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    An efficient real-time data collection model for multivariate sensors in internet of things (IOT) applications by MOhammed Alduais, Nayef Abdulwahab

    Published 2019
    “…EDCD aims to save the energy consumption of the IoT sensor board with multiple sensors by means of reducing the number of transmission packets, if no significant change is reported by the payload sensing block; second is proposed a validity of the measuring sensor reading at node level (VSNL) algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Evaluation of Clustering and Multi-hop Routing Protocols in Mobile Ad-hoc Sensor Networks by Jambli, M.N., Hendrick, A., Julaihi, A.A., Abdullah, J., Suhaili, S.M.

    Published 2015
    “…In static WSNs, the change of sensor nodes topology is normally caused by node failure which is due to energy depletion. …”
    Get full text
    Get full text
    Proceeding
  9. 9

    A hybrid multi-objective optimisation for energy efficiency and better coverage in underwater wireless sensor networks / Salmah Fattah by Salmah , Fattah

    Published 2022
    “…Furthermore, all analysis and evaluation attributes indicate that the MOGA-AMPazy deployment algorithm can handle the multi-objective underwater sensor deployment problem better than other solutions. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    A hybrid multi-objective optimisation for energy efficiency and better coverage in underwater wireless sensor networks by Salmah Fattah

    Published 2022
    “…Furthermore, all analysis and evaluation attributes indicate that the MOGA-AMPazy deployment algorithm can handle the multi-objective underwater sensor deployment problem better than other solutions. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Evoluation strategy for collaborative beamforming in wireless sensor networks by Wong, Chen How

    Published 2013
    “…The aim of this research is to improve the efficiency of the phase synchronisation algorithm in order to achieve collaborative beamforming (CB) in wireless sensor networks (WSNs). …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Evolution strategy for collaborative beamforming in wireless sensor networks by Wong, Chen How

    Published 2013
    “…The aim of this research is to improve the efficiency of the phase synchronisation algorithm in order to achieve collaborative beamforming (CB) in wireless sensor networks (WSNs). …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Magnetic imaging of ferromagnetic shape with Mobile Hall Sensor Array system by Misron, Norhisam, Ng, Wei Shin, Marhaban, Mohammad Hamiruce, Shafie, Suhaidi

    Published 2011
    “…The device consists of a linearly integrated 1-D Hall Sensor array to detect magnetic field changes on a ferromagnetic shape under evaluation. …”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Survey on Clustered Routing Protocols Adaptivity for Fire Incidents: Architecture Challenges, Data Losing, and Recommended Solutions by Abbas O.K., Abdullah F., Radzi N.A.M., Salman A.D., Abdulkadir S.J.

    Published 2025
    “…Additionally, this survey scrutinizes the challenges and constraints inherent in current fault tolerance routing algorithms, evaluating their efficacy in fire-related incidents. …”
    Article
  15. 15
  16. 16

    Enhancement Of Clustering Algorithm Using 3D Euclidean Distance To Improve Network Connectivity In Wireless Sensor Networks For Correlated Node Behaviours by Kalid Abdlkader Marsal Salih

    Published 2024
    “…The experiment uses four different scenarios namely, cooperatives node, selfish node, malicious node and failure node. The clustering algorithm will be compared against LEACH, EEC, R-HEED, PEGASIS, and LCA algorithms to evaluate the network performance of WSN. …”
    thesis::doctoral thesis
  17. 17

    Dealing with Routing Hole Problem in Multi-hop Hierarchical Routing Protocol in Wireless Sensor Network by Sama, Najm Us

    Published 2019
    “…A Wireless Sensor Network (WSN) consists of spatially distributed autonomous sensors which produces a measurable response to a change in a physical or chemical condition, e.g. temperature and ground composition. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Edge tracing of t-shirt by robot for spreading purposes by Sahari K.S.M., Seki H.

    Published 2023
    “…Based on the algorithm used for towel spreading, algorithm for edge tracing of shirt to find a second or third corner is proposed. …”
    Conference paper
  19. 19

    Enhancement Of Aodv Routing Protocol In Masnets by Jambli, M.N., Wan Mohd Shuhaimi, W.B., Lenando, H., Abdullah, J., Mohamad Suhaili, S.

    Published 2015
    “…The rapid development of wireless communication technologies and portable mobile devices such as laptops, PDAs, smart phones and wireless sensors brings the best out of mobile computing particularly mobile ad-hoc and sensor networks. …”
    Get full text
    Get full text
    Proceeding
  20. 20

    An efficient trust-based decision-making approach for WSNs: Machine learning oriented approach by Khan, T., Singh, K., Shariq, M., Ahmad, K., Savita, K.S., Ahmadian, A., Salahshour, S., Conti, M.

    Published 2023
    “…Simulation experiments exhibit the effectiveness of the proposed trust evaluation method in terms of change in trust values, malicious nodes detection (94), FNR (0.9), F1-Score (0.6), and accuracy (92) in the presence of 50 malicious nodes. …”
    Get full text
    Get full text
    Article