Search Results - (( key detection path algorithm ) OR ( java application sensor algorithm ))

  • Showing 1 - 10 results of 10
Refine Results
  1. 1

    Research on risk detection of autonomous vehicle based on rapidly-exploring random tree by Yincong Ma, Lim, Kit Guan, Tan, Min Keng, Sin, Helen Ee Chuo, Ali Farzamnia, Tze, Kenneth Kin Teo

    Published 2023
    “…A non-particle collision detection (NPCD) collision detection algorithm and path modification (PM) path modification strategy are proposed for the collision risk in the turning process, and geometric constraints are used to represent the possible security threats, so as to improve the efficiency and safety of vehicle global path driving and to provide reference for the research of driverless vehicles.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Comprehensive review of drones collision avoidance schemes: challenges and open issues by Rezaee, Mohammad Reza, Abdul Hamid, Nor Asilah Wati, Hussin, Masnida, Ahmad Zukarnain, Zuriati

    Published 2024
    “…We explore collision avoidance methods for UAVs from various perspectives, categorizing them into four main groups: obstacle detection and avoidance, collision avoidance algorithms, drone swarm, and path optimization. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…The process begins through the monitoring of plants using sensors connected to the Arduino device. Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    A Feasible Architecture Of Real-Time Collision Avoidance And Path Planning For Semi-Autonomous Unmanned Ground Vehicle (Ugv) by Subramaniam, Purawin

    Published 2018
    “…Therefore, APM is used for navigation before and after approaching obstacles. Path planning algorithm in this project provides the best path to avoid the obstacle and create temporary new waypoints within split seconds. …”
    Get full text
    Get full text
    Monograph
  5. 5
  6. 6

    A YOLO-based deep learning model for Real-Time face mask detection via drone surveillance in public spaces by A. Mostafa, Salama, Ravi, Sharran, Zebari, Dilovan Asaad, Zebari, Nechirvan Asaad, Mohammed, Mazin Abed, Nedoma, Jan, Martinek, Radek, Deveci, Muhammet, Ding, Weiping

    Published 2024
    “…Addressing these challenges entails an efficient and robust object detection and recognition algorithm. This algorithm can deal with a crowd of multiple faces via a mobile camera carried by a mini drone, and performs realtime video processing. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    A Development Of An Internet Of Things Equipped Unmanned Ground Vehicle For Surveilance Purpose by Azizan, Anis Natasha

    Published 2019
    “…Therefore, controller is used for navigation before and after approaching obstacles. Path planning algorithm in this project provides the best path to avoid the obstacle and create temporary new waypoints within split seconds. …”
    Get full text
    Get full text
    Monograph
  8. 8

    Human activity recognition via accelerometer and gyro sensors by Tee, Jia Lin

    Published 2023
    “…To implement the data engineering system proposed, two mobile applications, SensorData and SensorDataLogger with user-friendly interfaces and intuitive functionalities are developed using Java programming language and Android Studio. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  9. 9

    Secured route optimization in mobile IPv6 wireless networks in terms of data integrity by Mehdizadeh, Abbas, Khatun, Sabira, Mohd Ali, Borhanuddin, Raja Abdullah, Raja Syamsul Azmir, Kurup, Gopakumar

    Published 2008
    “…This algorithm is able to detect and prevent the attacker from modifying the data with using an encryption algorithm at a cost of a small increase in delay. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. Ultimately, the algorithm development program designed earlier is linked up directly to the robotic model for program implementation and verification. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item