Search Results - (( java implementation _ algorithm ) OR ( using active ((sensor algorithm) OR (path algorithm)) ))

Refine Results
  1. 1

    Path Planning and Control of Mobile Robot in Road Environments using Sensor Fusion and Active Force Control by Ali, Mohammed A. H., Mailah, Musa

    Published 2018
    “…The sensor fusion algorithm is used to remove noises and uncertainties from sensors' data and provide optimum measurements for path planning. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Nonlinear adaptive algorithm for active noise control with loudspeaker nonlinearity by Dehkordi, Sepehr Ghasemi

    Published 2014
    “…The proposed THF-NLFXLMS algorithm models the Wiener secondary path and applies the estimated degree of nonlinearity of the nonlinear secondary path in the control algorithm design. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Collision avoidance algorithm design for UAV base on parametric theorem and circle overlapping method / Nur Fadzilah Mohamad Radzi by Nur Fadzilah, Mohamad Radzi

    Published 2013
    “…Firstly, a mission waypoint path of UAV is given and assumes that all target information is collected from sensors (such as position sensors, angle heading sensor, and velocity sensors). …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Development of robust control scheme for wheeled mobile robot in restricted environment by Muhammad Sawal, A Radzak

    Published 2021
    “…A novel algorithm so called laser simulator logic (LSL) has been develo ped to estimate the inertia moment when the environment is noisy and cannot use fuzzy logic algorithm. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Nonlinear THF-FXLMS algorithm for active noise control with loudspeaker nonlinearity by Ghasemi, Sepehr, Raja Ahmad, Raja Mohd Kamil, Marhaban, Mohammad Hamiruce

    Published 2016
    “…Adaptive algorithms are prevalently applied in the design of nonlinear active noise control (ANC) systems. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Energy balancing mechanisms for decentralized routing protocols in wireless sensor networks by Saleh, Ahmed Mohammed Shamsan

    Published 2012
    “…This thesis presents three decentralized algorithms that are robust,scalable, and can be successfully executed in sensor networks. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Human activity recognition via accelerometer and gyro sensors by Tee, Jia Lin

    Published 2023
    “…To implement the data engineering system proposed, two mobile applications, SensorData and SensorDataLogger with user-friendly interfaces and intuitive functionalities are developed using Java programming language and Android Studio. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  9. 9

    Transformation path of modern media from the perspective of internet of things by Yujie, Zhang, Yasin, Megat Al Imran, AlSagoff, Syed Agil, Ang, Lay Hoon

    Published 2022
    “…Initially, we collected COVID-19-related data and preprocessed the raw data using the median absolute deviation method. The preprocessed data that is to be transferred to the media is then stored in the IoT device using various sensors. …”
    Get full text
    Get full text
    Article
  10. 10

    Dynamics and control of underactuated systems with applications in robotics / Ahmad Azlan Mat Isa … [et al.] by Mat Isa, Ahmad Azlan

    Published 2011
    “…An ANN modal was trained using the experimentally obtained data and then used to predict the path of the passive joint that is positioned by the dynamic coupling of the active joint. …”
    Get full text
    Get full text
    Research Reports
  11. 11

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…Today, with online marketing, banking, healthcare and other services, even the average householder is aware of encryption. The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  12. 12

    A Continuous Overlay Path Probing Algorithm For Overlay Networks by Feily, Maryam

    Published 2013
    “…The primary idea is to perform active measurements using the applications’ packets instead of using extra probe packets. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Obstacle Avoidance of a Mobile Robot Using Fuzzy Logic Control by Eshtawie, Mohamed Al-Mahdi

    Published 1999
    “…In addition, an on-line path planning is used while navigation. The controller will have its inputs from the sensors that will be mounted on the robot. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    Review on real-time control schemes for wheeled mobile robot by M. Sawal, A. R., Ali, Mohammed A. H., Sha'akmal, S., Azwan, A. R. A

    Published 2018
    “…The real-time toolbox in MATLAB/SIMULINK are used to receive/send data from sensors/to actuator with existing of real path disturbances.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Nonlinear FXLMS algorithm for active noise control systems with saturation nonlinearity by Sahib, Mouayad A., Raja Ahmad, Raja Mohd Kamil, Marhaban, Mohammad Hamiruce

    Published 2012
    “…In active noise control (ANC) applications, the saturation effect of the loudspeaker in the secondary path is considered as the most serious problem that could degrade performance of standard filtered-x least mean square (FXLMS) control algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    Provider independent cryptographic tools by Ibrahim, Subariah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
    Get full text
    Get full text
    Get full text
    Monograph
  19. 19

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  20. 20

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis