Search Results - (( java application path algorithm ) OR ( knowledge detection sensor algorithm ))
Search alternatives:
- knowledge detection »
- java application »
- application path »
- detection sensor »
- sensor algorithm »
- path algorithm »
-
1
Smart appointment organizer for mobile application / Mohd Syafiq Adam
Published 2009“…In creating this application, NetBeans IDE 6.5and Java Micro Edition (Java ME) are used. …”
Get full text
Get full text
Thesis -
2
Adaptive edge detection and image filtering using light sensor
Published 2005“…Thus, two techniques are proposed for this approach, first by using camera itself, and the second one by using a photo sensor. An edge detection algorithm should be able to be use for all images captured in various environment conditions. …”
Get full text
Get full text
Conference or Workshop Item -
3
Visdom: Smart guide robot for visually impaired people
Published 2025“…The system architecture integrates ROS 2 on a Raspberry Pi, with TCP/IP connectivity enabling remote operation. An Android mobile application, developed using Java and the java.net.Socket library, provides an intuitive and accessible user interface for seamless interaction with the robot. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
4
Vision Based Calibration and Localization Technique for Video Sensor Networks
Published 2009“…As most of the applications demand the knowledge of the sensor-locations and the network topology before proceeding with their tasks, especially those based on detecting events and reporting, the problem of localization and calibration assumes a significance far greater than most others in video sensor network. …”
Get full text
Get full text
Thesis -
5
Maze Mouse
Published 2004“…Focus of the project is primarily on the infrared sensor system and maze solving algorithm which are the critical part ofthis project.…”
Get full text
Get full text
Final Year Project -
6
iHOME: an ambient intelligence mobile crowd sensing smart home system
Published 2016Get full text
Get full text
Get full text
Conference or Workshop Item -
7
A hybrid multi-objective optimisation for energy efficiency and better coverage in underwater wireless sensor networks / Salmah Fattah
Published 2022“…Underwater wireless sensor networks (UWSNs), which benefit ocean surveillance applications, marine monitoring and underwater target detection, have advanced substantially in recent years. …”
Get full text
Get full text
Get full text
Thesis -
8
A hybrid multi-objective optimisation for energy efficiency and better coverage in underwater wireless sensor networks
Published 2022“…Underwater wireless sensor networks (UWSNs), which benefit ocean surveillance applications, marine monitoring and underwater target detection, have advanced substantially in recent years. …”
Get full text
Get full text
Get full text
Thesis -
9
Optimization of Sensor Location in Data Center
Published 2012“…Thus, this project aims to create a wireless temperature monitoring system with location optimization algorithm to optimize temperature sensors deployment/locations. …”
Get full text
Get full text
Final Year Project -
10
An Evolutionary Stream Clustering Technique for Outlier Detection
Published 2020“…Later, this algorithm will be extended to optimize the model in detecting outlier on data streams. …”
Get full text
Get full text
Conference or Workshop Item -
11
Development of an automated multidirectional pest sampling detection system using motorized sticky traps
Published 2021“…Different kernel functions, such as disk, diamond, square, and sphere, were used as matching functions for the insect detection and counting algorithm. The average accuracy of the highest sphere kernel was 85.2%. …”
Get full text
Get full text
Get full text
Article -
12
Google the earth: what's next?
Published 2010“…Considering the exponential growth of data volumes driven by the rapid progress in sensor and computer technologies in recent years, the future of remotely sensed data should ideally be in automated data processing, development of robust and transferable algorithms and processing chains that require little or no human intervention. …”
Get full text
Get full text
Get full text
Inaugural Lecture -
13
Bayesian Network Classifiers for Damage Detection in Engineering Material
Published 2007“…The methodology used in the thesis to implement the Bayesian network for the damage detection provides a preliminary analysis used in proposing a novel fea- ture extraction algorithm (f-FFE: the f-folds feature extraction algorithm). …”
Get full text
Get full text
Thesis -
14
-
15
Smart waste management system with IoT monitoring
Published 2023Get full text
Get full text
Get full text
Article -
16
Sentiment-analysis to detect early depressive symptom in Bangla language from social media: a review study
Published 2021“…The identification of mental health can be detected using several data domains such as: sensors, text, structured data, and multi-modal system use. …”
Get full text
Get full text
Article -
17
IoT based drainage monitoring system
Published 2023Get full text
Get full text
Get full text
Article -
18
Fault Diagnosis in Wind Energy Management System using Extreme Learning Machine: A Systematic Review
Published 2023Conference Paper -
19
A comprehensive analysis of surface electromyography for control of lower limb exoskeleton
Published 2016“…Results showed that the filter parameters selection could significantly affect the amplitude of the sEMG as well as it may conceal the exact onset/offset time of the signal. The developed algorithm for the crosstalk recordings detection shows ability in determining the presence of the overlapped measurements period. …”
Get full text
Get full text
Thesis -
20
Assistive technology : Sign language translation application for hearing-impaired communication / Muhammad Amin Naim Ab Karim
Published 2020“…The sign language translation application was also integrated with a hardware called the Microsoft Kinect Camera Sensor. This hardware was used to detect the gesture of sign language that performed by the user who stands in front of the hardware. …”
Get full text
Get full text
Thesis
