Search Results - (( program movement detection algorithm ) OR ( java evolution optimization algorithm ))

Search alternatives:

  • Showing 1 - 16 results of 16
Refine Results
  1. 1

    Performance evaluation of real-time multiprocessor scheduling algorithms by Alhussian, H., Zakaria, N., Abdulkadir, S.J., Fageeri, S.O.

    Published 2016
    “…The aim of this evolution is to reflect the unseen time overhead incurred by optimal real-time algorithm, represented by LRE-TL, which might hinder the claimed optimality of such algorithms when they are practically implemented. …”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    Electroencephalogram signal interpretation system for mobile robot by Hasan, Intan Helina

    Published 2013
    “…Currently, the BCI application is to acquire signals from 32 to 64 electrodes’ recordings and translate them to a movement using various computing algorithm which can be used in wheelchair navigation, or control robot movements. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Thermopile array sensor for children detection in automobile application by Che Mustapha, Nurul Arfah, Jamal Ali, Nurulhusna

    Published 2021
    “…The purpose of this report is to propose a dynamic background removal algorithm for human movement detection. Besides, this project aims to develop the proposed algorithm into image processing system. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  5. 5

    Parking finder mobile application by Tham, Chee Ming

    Published 2025
    “…In this system, computer vision and deep learning models such as YOLOv8 will be utilized for parking spaces and vehicle detection while the DeepSORT algorithm is implemented to track vehicle movement in real-time. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6

    A study on obstacle detection for IoT based automated guided vehicle (AGV) by Loh, Jit Hao, M. Nafis, O. Z.

    Published 2022
    “…Next, the KF programming algorithm managed to diminish the measurement noise including the Main bang and flaw echo of the ultrasonic sensor. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Mobile Robot with Navigation Control and Communication by Mohammad Yatim, Amirah Izzati

    Published 2016
    “…Besides, the robot will also need to detect obstacles and avoid it along its movement from one point to another autonomously. …”
    Get full text
    Get full text
    Final Year Project
  8. 8

    Train Track Misalignment Detection System by Kang , Chun Hong

    Published 2014
    “…Direction-cosine-matrix (DCM) algorithm was also implemented to detect and correct numerical error for the gyroscope via reference data from accelerometer. …”
    Get full text
    Get full text
    Final Year Project
  9. 9

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…The robotic model acts as a prototype or test-bed for programming execution. The model involves motorize movement, sensors detection and machine vision to be manipulated by the programmers inside their programs. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10
  11. 11

    Embedded vision system development using 32-bit Single Board Computer and GNU/Linux by Nur Farhan, Kahar

    Published 2011
    “…The stationary vehicle detection process is executed on the embedded vision system to evaluate the accuracy of detection made by the system. …”
    Get full text
    Thesis
  12. 12

    Experiment and analysis of computer vision-based wrist radial and ulnar deviation exercises by M. Zabri, Abu Bakar, Rosdiyana, Samad, Pebrianti, Dwi, Mahfuzah, Mustafa, Nor Rul Hasma, Abdullah

    Published 2017
    “…The hand tracking, center of palm detection and fingertips detection and Kinect sensor are used in this exercise system. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13
  14. 14

    Database encryption for a Web-based Claims System by Syed Zulkarnain Syed Idrus

    Published 2008
    “…On the other hand, the analysis of encryption algorithms with Web browsers, the results have shown that Twofish algorithm is best suited to the system that has been developed using ASP Web programming language on Internet Explorer. …”
    Get full text
    Thesis
  15. 15
  16. 16