Search Results - (( java application sensor algorithm ) OR ( _ intention path algorithm ))

  • Showing 1 - 14 results of 14
Refine Results
  1. 1

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…The process begins through the monitoring of plants using sensors connected to the Arduino device. Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2
  3. 3

    Analysis of Moderating Effect of Turnover Intention on the Relationship of Intrinsic Motivation and Employee Performance by Salim Alsouri Al Ali, Amna Rashid, Salahudin, Shahrul Nizam

    Published 2024
    “…The first stage involved a bootstrapping process to generate and determine the significance level and strength of the path. The second stage employed the PLS Algorithm process, generating a simple slope graph. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4
  5. 5
  6. 6

    Human activity recognition via accelerometer and gyro sensors by Tee, Jia Lin

    Published 2023
    “…To implement the data engineering system proposed, two mobile applications, SensorData and SensorDataLogger with user-friendly interfaces and intuitive functionalities are developed using Java programming language and Android Studio. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  7. 7

    Precise ICMP Traceback Based On Normal Flow Filtration in Denial of Services Attack by Izaddoost, Alireza

    Published 2008
    “…To achieve such a goal, this research improves the Intention-driven ICMP traceback model by filtering normal flow in the specific short time and two new algorithms in UDP-based and TCP-based attack are applied. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Algebraic Net Class Rewriting Systems, Syntax and Semantics for Knowledge Representation and Automated Problem Solving by Tirri, Seppo Ilari

    Published 2013
    “…New results are obtained within construction of problem solving systems where solution algorithms are derived parallel with other candidates applied to the same net classes. …”
    Get full text
    Get full text
    Journal
  9. 9

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. Ultimately, the algorithm development program designed earlier is linked up directly to the robotic model for program implementation and verification. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Cyber hygiene during Covid-19 to avoid cyber attacks by Lee, Yvonne Yi Jin

    Published 2022
    “…After received the responds from participants, we had run the analysis on all the variables by using SmartPLS 3.3 and calculate the PLS-SEM algorithm of the variables. After running the analysis, we discuss our key findings using the results for each path's t-statistic and p-value. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  11. 11
  12. 12

    Review of Kalman filter variants for SLAM in mobile robotics with linearization and covariance initialization by Muhammad Haniff, Gusrial, Nur Aqilah, Othman, Hamzah, Ahmad, Mohd Hasnun Ariff, Hassan

    Published 2025
    “…This article aims to provide a comprehensive review of SLAM concept in the context of mobile robotics navigation by focusing on theoretical principles, estimation problem, algorithm involved and related application. The existing literature is systematically analyzed and classified based on three main perspectives of navigation which are localization, mapping and path planning. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Performance evaluation of manet in presence of black hole nodes by Dhahir, Saif Mahmood

    Published 2017
    “…In this type of attack, the black hole node uses the maximum destination sequence number to lure the sender node, to send packets via the shortest path, so that it will drop or alter the packets intentionally instead of sending them to the destination. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Image orientation watermarking technique for copyright protection by Jasim, Hend Muslim

    Published 2016
    “…Watermarking attracts much interest in algorithm design to enable a signature to be embedded on secrecy and encryption beds. …”
    Get full text
    Get full text
    Get full text
    Thesis