Search Results - (( re extraction method algorithm ) OR ( java application sensor algorithm ))

  • Showing 1 - 18 results of 18
Refine Results
  1. 1

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…The process begins through the monitoring of plants using sensors connected to the Arduino device. Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2
  3. 3

    Human activity recognition via accelerometer and gyro sensors by Tee, Jia Lin

    Published 2023
    “…To implement the data engineering system proposed, two mobile applications, SensorData and SensorDataLogger with user-friendly interfaces and intuitive functionalities are developed using Java programming language and Android Studio. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  4. 4
  5. 5

    Adaptive artificial neural network for power system security assessment and control action by Al-Masri, Ahmed Naufal A.

    Published 2012
    “…However, the AANN approach does not replace traditional analysis methods, while these methods are still needed at the initial step of the approach. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7
  8. 8
  9. 9

    Palm vein recognition using scale invariant feature transform with RANSAC mismatching removal by Shi Chuan, Soh, M. Z., Ibrahim, Marlina, Yakno, D.J., Mulvaney

    Published 2017
    “…CASIA Multi Spectral Palm Print Image database is used for this re-search. Scale Invariant Feature Transform (SIFT) and RANSAC mismatching removal will be adopted for vein extraction and point feature matching with Eu-clidean Distance. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Book Chapter
  10. 10

    A new teaching learning artificial bee colony based maximum power point tracking approach for assessing various parameters of photovoltaic system under different atmospheric condit... by Dokala Janandra, Krishna Kishore

    Published 2024
    “…In order to ascertain the effectiveness of the proposed methods, the proposed methods have been compared with other studied methods. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. Ultimately, the algorithm development program designed earlier is linked up directly to the robotic model for program implementation and verification. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12
  13. 13
  14. 14

    Integration of filter-less unified power quality conditioner (UPQC) control scheme with solar photovoltaic and battery energy storage system / Muhammad Alif Mansor by Mansor, Muhammad Alif

    Published 2023
    “…However, some drawback exists in this traditional SRF method they involve a phase lock loop (PLL) for reference signal extraction, which can cause large amplitude and phase errors and, as a result, can lead to poor voltages and currents compensation. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Optimization of Microbial Electrolysis Cell for Sago Mill Wastewater Derived Biohydrogen via Modeling and Artificial Neural Network by Mohamad Afiq, Mohd Asrul

    Published 2023
    “…Model validity describes the first sub-objective, which is to solve the complexity of the nonlinear interaction of multiple MEC input variables related to the hydrogen production rate response using artificial neural networks (ANN) before validating the mathematical modeling results by comparing experimental data with the predicted substrate concentration profile and hydrogen production rate profile based on the re-estimated input values of the model parameters using single-objective optimization based on the nonlinear convex method using gradient descent algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…An attacker can easily reconstruct source code from such intermediate formats to extract sensitive information such as proprietary algorithms present in the software. …”
    Get full text
    Get full text
    Thesis
  18. 18

    An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach by Mohamed Yassin, Warusia

    Published 2015
    “…Subsequently, NB+RF, a hybrid classification algorithm is used to distinguish similar and dissimilar content behaviours of a packet. …”
    Get full text
    Get full text
    Thesis