Search Results - (( safety implementation case algorithm ) OR ( java data visualization algorithm ))
Search alternatives:
- safety implementation »
- implementation case »
- data visualization »
- case algorithm »
- java »
-
1
Enhanced bibliographic data retrieval and visualization using query optimization and spectral centrality measure
Published 2019“…This study proposing an enhance bibliographic data retrieval and visualization using hybrid clustering method consists of K-harmonic mean (KHM) and Spectral Algorithm and eigenvector centrality measure. …”
Get full text
Get full text
Get full text
Article -
2
Web-based RIG performance reporting system using interactive visualization techniques / Amir Hambaly Nasaruddin
Published 2019“…The result of this project is all algorithm for visualizing data is functioning and the output produced from the system is correct and effective. …”
Get full text
Get full text
Thesis -
3
Dynamic force-directed graph with weighted nodes for scholar network visualization
Published 2022“…The approach is realized by creating a web-based interface using D3 JavaScript algorithm that allows the visualization to focus on how data are connected to each other more accurately than the conventional lines of data seen in traditional data representation. …”
Get full text
Get full text
Article -
4
Design Of Robot Motion Planning Algorithm For Wall Following Robot
Published 2006“…Computer A will be sent the data to computer B through the internet/LAN using JAVA program. …”
Get full text
Get full text
Monograph -
5
Case driven TLC model checker analysis in energy scenario
Published 2023“…Today, model checking techniques and corresponding tools are widely applied in diverse case driven scenarios, the safety critical ones in particular. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Car plate recognition system : (segmentation)
Published 2005“…Therefore,the purpose of this research is to develop a prototype by referring the University College of Engineering & Technology of Malaysia (UTEC) as the case study.The use of human workforce for the safety control in UTEC really cannot be implemented consistently and effectively since human ability is limited. …”
Get full text
Get full text
Undergraduates Project Papers -
7
Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform
Published 2009“…The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
A safe overtaking control scheme for autonomous vehicles using rapid-exploration random tree
Published 2022“…Firstly, the kinematics and dynamic model of the vehicle are implemented. Secondly, the RRT algorithm and the A-star algorithm are expounded, and the idea of the A-star algorithm is applied to the RRT algorithm for improvement. …”
Get full text
Get full text
Get full text
Get full text
Proceedings -
9
Optimizing in-car-abandoned children’s sounds detection using deep learning algorithms / Nur Atiqah Izzati Md Fisol
Published 2023“…The optimized models have the potential to significantly reduce the number of abandoned children in cars cases, contributing to enhanced safety measures. …”
Get full text
Get full text
Student Project -
10
Flexible window-based scheduling with critical worst case latency evaluations for real time traffic in time sensitive networks
Published 2022“…The first part introduces a flexible window-overlapping scheduling (FWOS) algorithm that allows the TT windows to overlap in GCL implementations. …”
Get full text
Get full text
Thesis -
11
Development Of Machine Learning User Interface For Pump Diagnostics
Published 2022“…Build up a user interface by using Visual Studio Code (VSC) to run the coding of Cascading Style Sheet (CSS), Hyper Text Markup Language (HTML) and JavaScript (JS) as a webpage and connect to Azure Machine Learning Model and this will allow the user from using the model from a webpage when they have active internet with any devices.…”
Get full text
Get full text
Monograph -
12
Tacit knowledge for business intelligence framework using cognitive-based approach
Published 2022“…The framework was tested on 23 librarians from several university libraries in West Java and Yogyakarta, Indonesia. The algorithm starts with a content targeted interview to identify the list of problems faced by librarians. …”
Get full text
Get full text
Thesis -
13
Modelling Autonomous Evacuation Navigation System (AENS) for optimal route using Dijkstra's algorithm
Published 2016“…Through ST adaptation, all subsystems were integrated and using the “Dijkstra’s algorithm” (DA) by modifying its function from shortest path algorithm to safest and shortest algorithm, to the nearest exit. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
14
Accident Prevention Block to Move an Automobile From Traffic Collision
Published 2019“…An effective solution needs to be implemented to help the driver in the event of losing consciousness and move the vehicle to safety, to avoid any collision with traffic. …”
Get full text
Get full text
Get full text
Article -
15
Development of low-overhead soft error mitigation technique for safety critical neural networks applications
Published 2021“…DNN-based healthcare applications are safety-critical systems that require highreliability implementation due to a high risk of human death or injury in case of malfunction. …”
Get full text
Get full text
Thesis -
16
Seat belt control system : drowsiness detector system
Published 2022“…At the end, the developed system can be implemented in older models of vehicles to decrease the rate of accidents and fatalities in Malaysia, as well improve safety of the driver.…”
Get full text
Get full text
Undergraduates Project Papers -
17
High-throughput and energy-efficient Contiki MAC layer scheme in IEEE 802.15.4 for structural health monitoring
Published 2021“…Finally, a case study of a WSN-based SHM system using developed embedded data filtering and transmission algorithms to reduce data communication is performed and taken place on a concrete beam at Civil Engineering Structure Laboratory, UPM. …”
Get full text
Get full text
Thesis -
18
A hybrid algorithm of source localization based on hyperbolic technique in WSN
Published 2014“…In this study, explicit solutions are provided by the proposed methods that are not achievable through the established methods in all cases.…”
Get full text
Get full text
Conference or Workshop Item -
19
Video surveillance: Front-yard monitoring
Published 2023“…Home intrusion is a severe crime that disrupts the safety and well-being of neighbourhoods. It has been happening at a shocking rate in recent years. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
20
Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee
Published 2012“…Prototypes, simulations, observations and interviews were used as the data gathering methods. An offline FOA Java simulation was carried out to evaluate the capability of the MRA method in preventing FOA attack. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis
