Search Results - (( processes specification window algorithm ) OR ( java application sensor algorithm ))

Refine Results
  1. 1
  2. 2

    Efficient management of Top-k queries over Uncertain Data Streams with dynamic Sliding Window Model by Raja Wahab, Raja Azhan Syah

    Published 2024
    “…This study aims to propose a framework for processing Top-k queries in UDS, where the focus is on leveraging the efficiency of the SWM, achieved through the SWMTop-kDelta algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…The process begins through the monitoring of plants using sensors connected to the Arduino device. Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Towards lowering computational power in IoT systems: Clustering algorithm for high-dimensional data stream using entropy window reduction by Alkawsi G., Al-amri R., Baashar Y., Ghorashi S., Alabdulkreem E., Kiong Tiong S.

    Published 2024
    “…EWR is a fully online clustering technique for handling high-dimensional data streams using feature ranking and sorting. This process is accomplished by calculating the entropy of specific features with respect to the time window. …”
    Article
  5. 5

    Efficient hardware design for palm-dorsa vein image enhancement by Jusoh@Yusoff, Suhaimi Bahisham

    Published 2018
    “…For hardware design of thinning, parallel pipelined with Concurrent Condition Check Unit hardware architecture has been developed to enable the parallelism of the thinning algorithm. It contains modules that executed the thinning algorithm function simultaneously in hardware to speed up the process. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Noise Cancellation method in assistive listening system by Noor Aliff, Noor Affande

    Published 2020
    “…Those algorithms were Least Means Square, Normalize-Least Means Square, Recursive Least Square, Simple SetMembership Algorithm and Dynamic Set-Membership Affine Projection Algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  7. 7
  8. 8

    Proactive Traffic-Adaptive Tuning of Contention Window for Wireless Sensor Network Medium-Access Control Protocol by Pirborj, Nesae Mouzehkesh

    Published 2009
    “…We have tried to come up with a dynamic back-off algorithm for SMAC that can extract the current traffic information of the network and engage them in estimating the contention window from which the back-off time is chosen. …”
    Get full text
    Get full text
    Thesis
  9. 9

    An efficient unknown detection approach for RFID data stream management system by Siti Salwani, Yaacob, Hairulnizam, Mahdin, Wijayanto, Inung, Muhammad Aamir, -, Mohd Izham, Mohd Jaya, Nabilah Filzah, Mohd Radzuan, Al Fahim, Mubarak Ali

    Published 2025
    “…A novel algorithm called SWOR (Sliding Window XOR-based Detection) is introduced, specifically designed to identify unknown tags within RFID data streams. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10
  11. 11

    Noise reduction techniques in ECG signal by Muhumed, Sakarie Muse, Ibrahimy, Muhammad Ibn

    Published 2023
    “…A dataset of ECG signals with varying levels of EMG noise has been collected using the MIT-BIH dataset. An algorithm has been designed and implemented using the DA FIR filter coupled with Kaiser windowing technique to filter out the noise. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Human activity recognition via accelerometer and gyro sensors by Tee, Jia Lin

    Published 2023
    “…To implement the data engineering system proposed, two mobile applications, SensorData and SensorDataLogger with user-friendly interfaces and intuitive functionalities are developed using Java programming language and Android Studio. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  13. 13

    Texture-based of Naja Kaouthia snake recognition using K-Nearest Neighbour (KNN) / Nurul Hafeeza Aswani Aziz by Aziz, Nurul Hafeeza Aswani

    Published 2017
    “…A total of 20 images have been captured at Taman Rama dan Reptilia, Malacca and each images produced 10 data of extraction. In the processing phase, mean variance moving window was used for the extraction process. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Cache replacement algorithm using hierarchical allocation scheduling by Mohd Sharif, Mohammad Faizal

    Published 2014
    “…The existing cache replacement (i.e. least recently used (LRU)) algorithm depends on usage of the data being referenced. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Blogs Search Engine Adopting RSS Syndication Using Fuzzy Logic by Mohammed, Athraa Jasim

    Published 2012
    “…The blogs search engine consists of three main phases which are crawling using RSS feeds algorithm, indexing weblogs algorithm and searching technique with Fuzzy logic. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    A new method of correcting uneven illumination problem in fundus images by Aibinu, Abiodun Musa, Iqbal, Muhammad Imran, Nilsson, Mikael, Salami, Momoh Jimoh Emiyoka

    Published 2007
    “…A new method of compensating uneven (irregular) illumination in fundus images termed global-local adaptive histogram equalization using partially-overlapped windows (GLAPOW) is proposed in this paper. The developed algorithm has been tested and the results obtained show superior performance when compared to other known techniques for uneven illumination correction.…”
    Get full text
    Get full text
    Proceeding Paper
  17. 17

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. Ultimately, the algorithm development program designed earlier is linked up directly to the robotic model for program implementation and verification. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Exploration of educational building with cultural elements using shape grammar by Sebastian, Heng Junjie

    Published 2013
    “…Shape grammars are used for developing computational algorithms in production systems that generate geometric shapes. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  19. 19
  20. 20

    Monitoring cathodic protection system for underground pipeline by Thai, Seng Choong

    Published 2013
    “…A local server running on windows platform was used to capture and display the readings on graph. …”
    Get full text
    Get full text
    Thesis