Search Results - (( program among normalization algorithm ) OR ( java application path algorithm ))

  • Showing 1 - 12 results of 12
Refine Results
  1. 1

    Smart appointment organizer for mobile application / Mohd Syafiq Adam by Adam, Mohd Syafiq

    Published 2009
    “…In creating this application, NetBeans IDE 6.5and Java Micro Edition (Java ME) are used. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Visdom: Smart guide robot for visually impaired people by Lee, Zhen Ting

    Published 2025
    “…The system architecture integrates ROS 2 on a Raspberry Pi, with TCP/IP connectivity enabling remote operation. An Android mobile application, developed using Java and the java.net.Socket library, provides an intuitive and accessible user interface for seamless interaction with the robot. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  3. 3
  4. 4

    Neural network based model predictive control for a steel pickling process by Kittisupakorn, P., Thitiyasook, P., Hussain, Mohd Azlan, Daosud, W.

    Published 2009
    “…The baths exhibit the normal features of an industrial system such as nonlinear dynamics and multi-effects among variables. …”
    Get full text
    Get full text
    Article
  5. 5

    Development of MATLAB® GUI for infant cry signal analysis using FFT / Suzilawati Muhamud @ Kayat by Muhamud @ Kayat, Suzilawati

    Published 2008
    “…FFT analysis and Hilbert transformation were used to extract information embedded in both cry signals Algorithms and programming utilizing MATLAB R2007b were written to search for the fundamental frequency of each cry signal and to identify the type of signal uniquely according to its fundamental frequency. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Framework for pedestrian walking behaviour recognition to minimize road accident by Hashim Kareem, Zahraa

    Published 2021
    “…The results indicate the following: (1) From 262 samples, 66.80% and 48.10% of respondents use mobile phones for calling and chatting, respectively. (2) 263 samples of participants are obtained and analysed, and 90 features are extracted from each sample. (3) 100% classification accuracy are obtained for each class (normal walking, calling, chatting, and running) using the grid optimiser method in machine learning. (4) The precision of classification using Euclidean algorithm for normal walking and calling is 70%. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Framework for pedestrian walking behaviour recognition to minimize road accident by Hashim Kareem, Zahraa

    Published 2021
    “…The results indicate the following: (1) From 262 samples, 66.80% and 48.10% of respondents use mobile phones for calling and chatting, respectively. (2) 263 samples of participants are obtained and analysed, and 90 features are extracted from each sample. (3) 100% classification accuracy are obtained for each class (normal walking, calling, chatting, and running) using the grid optimiser method in machine learning. (4) The precision of classification using Euclidean algorithm for normal walking and calling is 70%. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Nearfield Electromagnetic Imaging Technique For Brain Tumour Detection by Eustacius Jude, Anak Joseph Linggong

    Published 2019
    “…Brain tumour is among the deadliest disease that is fatal if left untreated. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Analyzing the cost-effectiveness of enhancement approaches for rehabilitating water distribution network by Abdel Rahman Mohamed Ismail, Farouk Abdel Mageed Rady

    Published 2021
    “…Then, Cronbach’s alpha, mean score ranking, normalization value, and agreement analysis were carried in the data analysis phase. …”
    Get full text
    Get full text
    Thesis
  12. 12

    A multi-filter feature selection in detecting distributed denial-of-service attack by Yon, Yi Jun, Leau, Yu-Beng, Suraya Alias, Park, Yong Jin

    Published 2019
    “…Flash crowd attack is the most challenging problem among the attacks which targeting the web server during the Flash Events (FEs). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item