Search Results - (( java implementation phase algorithm ) OR ( pattern using sensor algorithm ))
Search alternatives:
- implementation phase »
- java implementation »
- sensor algorithm »
- phase algorithm »
- pattern using »
-
1
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…All the algorithm for the engine has been developed by using Java script language. …”
Get full text
Get full text
Thesis -
2
Neural network algorithm development for Ion Sensitive Field Effect Transistor (ISFET) sensor / Muhammad Nasrul Hakim Adenan
Published 2013“…Backpropagation is used as the learning method of ANN model. The algorithm will be developed in MATLAB. …”
Get full text
Get full text
Thesis -
3
Neural network algorithm development for Ion Sensitive Field Effect Transistor (ISFET) sensor: article / Muhammad Nasrul Hakim Adenan and Maizatul Zolkapli
Published 2013“…Backpropagation is used as the learning method of ANN model. The algorithm will be developed in MATLAB. …”
Get full text
Get full text
Article -
4
Object with symmetrical pattern recognition with dynamic size filter
Published 2011“…One of the advantages of this project is that it only used a camera and image processing generated by the algorithms itself without additional sensor such as sonar or IR sensor.…”
Get full text
Get full text
Conference or Workshop Item -
5
Sensing texture using an artificial finger and a data analysis based on the standard deviation
Published 2015“…The algorithm output can use any length of data input. …”
Get full text
Get full text
Get full text
Article -
6
Abnormal Pattern Detection In Ppg Signals Using Time Series Analysis
Published 2022“…This project’s objectives are to implement rule-based algorithm method for abnormal pattern detection in PPG signals, and to investigate the accuracy and performance of rule-based algorithm in detecting the abnormal pattern. …”
Get full text
Get full text
Undergraduates Project Papers -
7
Sensing texture using an artificial finger and a data analysis based on the standard deviation
Published 2015“…The results from the algorithm are confirmed with an analysis of the signals using fast Fourier transforms.…”
Get full text
Get full text
Get full text
Get full text
Article -
8
Area-Based Concentration Measurement Using Optical Tomography Technique For Various Flow Patterns
Published 2005“…Sensor Modeling And Reconstruction Algorithm Are Discussed. …”
Get full text
Get full text
Get full text
Article -
9
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Misuse detection algorithms model know attack behavior. They compare sensor data to attack patterns learned from the training data. …”
Get full text
Get full text
Thesis -
10
The Potential of a Classification-based Algorithm to Calculate Calories in Real-Time Via Pattern Recognition
Published 2016“…While the algorithm helped to classify different types of wavelengths produced from the sensor, a classification-based algorithm via Pattern Recognition Method will be used to classify and match the food components. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Advanced differential interferometry synthetic aperture radar techniques for deformation monitoring: a review on sensors and recent research development
Published 2014“…Also, current issues in sensor and algorithm development are discussed. The study identified six existing A-DInSAR algorithms used for monitoring various deformation types. …”
Get full text
Get full text
Article -
12
Investigating optimal smartphone placement for identifying stairs movement using machine learning
Published 2023“…It was observed that, by using the Decision Tree and Random Forest algorithm 100% accuracy was achieved, when the smartphone was placed at the thigh during stair movement. …”
Get full text
Get full text
Get full text
Get full text
Article -
13
-
14
A green clustering protocol for mobile sensor network using particle swarm optimization
Published 2016“…One of the methods that can improve the utilization of sensor nodes batteries is the clustering method. In this paper, we propose a green clustering protocol for mobile sensor networks using particle swarm optimization (PSO) algorithm. …”
Get full text
Get full text
Article -
15
A green clustering protocol for mobile sensor network using particle swarm optimization
Published 2016“…One of the methods that can improve the utilization of sensor nodes batteries is the clustering method. In this paper, we propose a green clustering protocol for mobile sensor networks using particle swarm optimization (PSO) algorithm. …”
Get full text
Get full text
Article -
16
The development of an automated pattern recognition based on neural network / Irni Hamiza Hamzah, Mohammad Nizam Ibrahim and Linda Mohd Kasim
Published 2006“…Pattern recognition techniques are used to automatically classify a variety of physical objects or abstract patterns. …”
Get full text
Get full text
Research Reports -
17
A feasibility study of using an Electronic Nose as a fruit ripeness measuring instrument
Published 2009Get full text
Working Paper -
18
Optimal route checking using genetic algorithm for UiTM's bus services / Tengku Salman Fathi Tengku Jaafar
Published 2006“…Although from human logical thinking, the route can be generated easily but the calculation of checking the route whether it is optimal route or not is difficult and will take long time to be implemented. This research study with the development of the Optimal Route Checking Using Genetic Algorithm system should solve this scenario. …”
Get full text
Get full text
Thesis -
19
Real time self-calibration algorithm of pressure sensor for robotic hand glove system
Published 2019“…This study investigates the use of a novel Proposed Self-Calibration Algorithm (PSCA) of multi pressure sensors in real time on robotic hand glove system. …”
Get full text
Get full text
Thesis -
20
A study on advanced statistical analysis for network anomaly detection
Published 2005“…Misuse detection algorithms model know attack behavior. They compare sensor data to attack patterns learned from the training data. …”
Get full text
Monograph
