Search Results - (( java detection method algorithm ) OR ( system implementation sensor algorithm ))
Search alternatives:
- system implementation »
- implementation sensor »
- method algorithm »
- sensor algorithm »
- java detection »
-
1
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…This research presents a design and development of robotic system based on LEGO Mindstorm kit. The system is capable in operating an off-line programming method, starting from its programming sequences until robotic implementation of the program. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
2
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
DESIGN AND DEVELOPMENT OF MULTI-INPUT SENSOR ALGORITHM FOR AUTONOMOUS UNDERWATER VEHICLE (AUV) APPLICATIONS
Published 2010“…The monitoring and detection will be based on multi-input received from the intelligent and active vision and sensors implemented in the AUV. The sensors implemented in AUV such as vision system, hydrophone system and sonar system. …”
Get full text
Get full text
Conference or Workshop Item -
4
-
5
Real-time model based sensor fault tolerant control system on a chip
Published 2009“…In this paper, we proposed a model based sensor fault tolerant control system embedded in a generic PIC microcontroller for use in a temperature control system. …”
Get full text
Conference or Workshop Item -
6
Development of multi-input sensor algorithm for autonomous underwater vehicle (AUV) system stage 2
Published 2010“…The sensors implemented in AUV such as vision system, hydrophone system and sonar system successful develop in stage one. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Fitness value based evolution algorithm approach for text steganalysis model
Published 2013“…In this paper, we present a new alternative method for text steganalysis based on an evolution algorithm, implemented using the Java Evolution Algorithms Package (JEAP).The main objective of this paper is to detect the existence of hidden messages ased on fitness values of a text description.It is found that the detection performance has been influenced by two groups of fitness values which are good fitness value and bad fitness value. …”
Get full text
Get full text
Article -
8
Development of self-learning algorithm for autonomous system utilizing reinforcement learning and unsupervised weightless neural network / Yusman Yusof
Published 2019“…In the algorithm development a step-by-step example of the algorithm implementation is presented and then successfully implemented in Lego Mindstorm obstacle avoiding mobile robot as a proof of concept implementation of the hybrid AI algorithm. …”
Get full text
Get full text
Thesis -
9
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Features selection process can be considered a problem of global combinatorial optimization in machine learning. Genetic algorithm GA had been adopted to perform features selection method; however, this method could not deliver an acceptable detection rate, lower accuracy, and higher false alarm rates. …”
Get full text
Get full text
Thesis -
10
Ultrasonic parking sensors using triangulation algorithm / Mohamad Syahzmeer Mohamed Sufian
Published 2019“…This work presents the design and implementation of ultrasonic parking sensors using the triangulation algorithm. …”
Get full text
Get full text
Student Project -
11
Design and development of sensor based traffic light system
Published 2006Get full text
Get full text
Get full text
Article -
12
Real time self-calibration algorithm of pressure sensor for robotic hand glove system
Published 2019“…This study investigates the use of a novel Proposed Self-Calibration Algorithm (PSCA) of multi pressure sensors in real time on robotic hand glove system. …”
Get full text
Get full text
Thesis -
13
Modelling and analysis of sensor fault tolerant control using behavioral approach to systems theory
Published 2015“…The main focus of this research is to incorporate behavioral approach to systems theory for modelling and analysis of sensor fault tolerant control system (FTCS). …”
Get full text
Get full text
Get full text
Thesis -
14
Development of an algorithm for correlation of aircraft positioning data from radar and ADS-B sensors / Koh Che Hun
Published 2019“…Advancement in aircraft surveillance sensor technology saw the emergence of new sensors, such as the Automatic Dependent Surveillance Broadcast (ADS-B) and Multilateration systems. …”
Get full text
Get full text
Get full text
Thesis -
15
Text steganalysis using evolution algorithm approach
Published 2012“…This study presents a new alternative of steganalysis method in order to detect hidden messages in text steganalysis called Evolution Detection Steganalysis System (EDSS) based on the evolution algorithm approach under Java Genetic Algorithms Package (JGAP). …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Web Camera Application For Motion Detection
Published 2003“…Therefore no hardware sensors like active sensor and passive sensor are required. …”
Get full text
Get full text
Thesis -
17
Simulated kalman filter (SKF) based image template matching for distance measurement by using stereo vision system
Published 2018“…Based on literature, stereo algorithm is already being implemented to solve the distance measurement problem. …”
Get full text
Get full text
Thesis -
18
Vision Based Multi Sensor Feedback System For Robot System With Intelligent
Published 2009“…One of the advantages of this research is that it only uses a low resolution camera and image processing software generated by the algorithms itself without additional sensors such as sonar or IR sensor. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
19
Hardware development of ultrasonics tomography for composition determination of water and oil flow
Published 2007“…A monitoring system for water and oil flow using ultrasonic Tomography is implemented. …”
Get full text
Get full text
Article -
20
Improved message authentication technique on IEEE 802.15.4 wireless sensor network using multiple key protocol
Published 2014“…The authentication algorithm of IEEE 802.15.4 has constraints on a multi processor system, since it can work only in sequential fashion. …”
Get full text
Get full text
Thesis
