Search Results - (( processes specification sensor algorithm ) OR ( processes specification method algorithm ))

Refine Results
  1. 1

    Metaheuristic optimization techniques for localization in outdoor wireless sensor networks: a comprehensive review by Gumaida, Bassam, Ibrahim, Adamu Abubakar

    Published 2025
    “…This paper serves as a comprehensive background on localization algorithms and methods used in wireless sensor networks, offering insights for researchers to develop efficient localization algorithms tailored to specific application requirements in diverse work environments.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    VHDL modeling of optimum measurement selection by using genetic algorithm by Ullah, Mohammad Habib, Hasan, Muhammad Asfarul, Uddin, Md. Jasim, Priantoro, Akhmad Unggul

    Published 2009
    “…A Genetic Algorithm (GA) that is going to be a part of a system for obtaining optimum sensor measurements for a specific process. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    A single measurement of combined Direct and indirect MPPT algorithm for mismatch PV module application / Mohd Najib Mohd Hussain by Mohd Hussain, Mohd Najib

    Published 2016
    “…The MBD is divided into four parts; executable system properties, design and simulation of the properties, execution and implementation for code generation and verification process. The properties dataset of building integrated PV system located in Malaysian Green Technology Corporation are taken as requirement and specification for the MBD system. …”
    Get full text
    Get full text
    Thesis
  4. 4

    RWP-NSGA II: reinforcement weighted probabilistic NSGA II for workload allocation in fog and internet of things environment by Ariffin, Ahmad Alauddin, Belhaouari, Samir Brahim, Raissouli, Hafsa

    Published 2024
    “…This method uses domain-specific knowledge to improve convergence and solution quality, resulting in reduced delay and better energy efficiency compared to traditional NSGA II and other evolutionary algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Permission-based fault tolerant mutual exclusion algorithm for mobile Ad Hoc networks by Zarafshan, Faraneh

    Published 2015
    “…Token-based algorithms depend on circulation of a specific message known as token. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Incremental interval type-2 fuzzy clustering of data streams using single pass method by Qaiyum, S., Aziz, I., Hasan, M.H., Khan, A.I., Almalawi, A.

    Published 2020
    “…Data Streams create new challenges for fuzzy clustering algorithms, specifically Interval Type-2 Fuzzy C-Means (IT2FCM). …”
    Get full text
    Get full text
    Article
  7. 7

    A hybrid prediction model for pipeline corrosion using Artificial Neural Network with Particle Swarm Optimization by Ee, L.K., Aziz, I.A.

    Published 2018
    “…However, there are different factors which cause corrosion and current analytical methods are not specific enough in the prediction process. …”
    Get full text
    Get full text
    Article
  8. 8

    A hybrid prediction model for pipeline corrosion using Artificial Neural Network with Particle Swarm Optimization by Ee, L.K., Aziz, I.A.

    Published 2018
    “…However, there are different factors which cause corrosion and current analytical methods are not specific enough in the prediction process. …”
    Get full text
    Get full text
    Article
  9. 9

    Enhancing navigation accuracy of Turtlebot3 Burger mobile robot by Muhammad Haniff, Gusrial, Muhammad Luqman Hakim, Abdullah, Nur Aqilah, Othman, Hamzah, Ahmad

    Published 2024
    “…This project aims to identify the initial covariance value of a ROS-based mobile robot, specifically the Turtlebot3 Burger. The basic navigation of the robot requires a significant amount of data and resources to process the output path. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Study of hand gesture recognition using impulse radio ultra wideband (IRUWB) radar sensor by Terence Jerome Daim

    Published 2023
    “…The developed algorithms interpret raw IR-UWB radar sensor data and associate it with specific hand gestures, addressing the core objective of gesture recognition. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Covariance matrix analysis in simultaneous localization and mapping by Nur Aqilah, Othman

    Published 2016
    “…Nonetheless, EKF-based SLAM suffers from high computational cost due to the update process of covariance matrix. One of the objectives of this thesis is to propose an alternative method to simplify the structure of covariance matrix by means of matrix diagonalization method using eigenvalues. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Shape-Based Matching: Application of Edge Detection using Harris Point by Harun, Mohamad Haniff, Sulaiman , Marizan, Mohd Shah, Hairol Nizam

    Published 2011
    “…The location of all generate points are displayed using Graphical User Interface (GUI). This method is proposed to develop an additional new system of the glue process in automation industry that provides input data from vision sensor to reduce possibilities of failure.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    To study on the effect of tuning rules used on the water level controllability by Ismail, Arif Iskandar

    Published 2017
    “…The PID controller has the ability to control the trend and specific responses for a smooth transition of the water reaching the desired level point with the tunings and algorithm parameters entered by the handler (human) together with safety aspects monitored by the PID controller especially in hazardous plant…”
    Get full text
    Get full text
    Student Project
  14. 14

    To study on the effect of tuning rules used on the water level controllability: article by Ismail, Arif Iskandar, Ishak, Abdul Aziz

    Published 2017
    “…The PID controller has the ability to control the trend and specific responses for a smooth transition of the water reaching the desired level point with the tunings and algorithm parameters entered by the handler (human) together with safety aspects monitored by the PID controller especially in hazardous plant.…”
    Get full text
    Get full text
    Article
  15. 15

    Web service applications and consumer environments based on ICT-driven optimization by Fan, Chaozhi, Law, Siong Hook, Ibrahim, Saifuzzaman, Ahmad, Mohd Naseem

    Published 2022
    “…However, existing network embedding methods mostly target a specific structure of network and do not collaborate with multiple relational networks from the root. …”
    Get full text
    Get full text
    Article
  16. 16

    REAL TIME ABNORMAL SOUND DETECTION AND CLASSIFICATION FOR HOME ENVIRONMENT by MOHAMED AMIN, SITI NUR AZIMAH

    Published 2011
    “…For abnormal sound detection, mean signal approach being used while for classification process, there two main methods being used which are features extraction using Mel-Frequency Cepstral Coefficient (MFCC) and classifier using Gaussian Mixture Model (GMM). …”
    Get full text
    Get full text
    Final Year Project
  17. 17

    Modeling and control of a Pico-satellite attitude using Fuzzy Logic Controller by Zaridah, Mat Zain

    Published 2010
    “…This algorithm encode a potential solution to a specific problem on a simple chromosome like data structure and apply recombination operators to this structure to preserve critical information. …”
    Get full text
    Thesis
  18. 18

    Defect detection of GFRP composites through long pulse thermography using an uncooled microbolometer infrared camera by Anwar, Murniwati, Mustapha, Faizal, Abdullah, Mohd Na’im, Mustapha, Mazli, Sallih, Nabihah, Ahmad, Azlan, Mat Daud, Siti Zubaidah

    Published 2024
    “…The TC success rate reached 0.91 for detecting FBH depth defects in raw images, which improved significantly after post-processing using Canny edge detection and Hough circle detection algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Image processing-based flood detection by Ariawan, Angga, Pebrianti, Dwi, Ronny, Akbar, Yudha Maulana, Margatama, Lestari, Bayuaji, Luhur

    Published 2019
    “…We use OpenCV as an image processing application. The steps are as follows: (1) Region of Interest to create a portion of an image to filter or perform some other operation. (2) Brightness and contrast adjustment in order to get brighter and better image before the next process. (3) Grayscale and threshold to create segmentation object with Otsu-thresholding. ( 4) Edge detection algorithm to find edge points on a roughly horizontal water line and riverbank height By using the above method, the system can read and monitor the \Valer level of a river or other water bodies. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Kinect-based human gait recognition using locally linear embedded and support vector machine by Rohilah Sahak, Nooritawati Md Tahir, Ahmad Ihsan Mohd Yassin, Fadhlan Hafizhelmi Kamaruzaman

    Published 2018
    “…Firstly, dynamic gait features for one gait cycle are extracted from each subject’s walking gait that is acquired using Kinect sensor. Next, the extracted gait features were then optimized using LLE known as DG-LLE and further classified by multi-class SVM with Error Correcting Output Code (ECOC) algorithm. …”
    Get full text
    Get full text
    Get full text
    Article