Search Results - (( safety implementation function algorithm ) OR ( java application customization algorithm ))

Refine Results
  1. 1

    Implementation Of Algorithm For Vehicle Anti-Collision Alert System In FPGA by Jidin, Aiman Zakwan, Lim, Siau Li, Kadmin, Ahmad Fauzan

    Published 2017
    “…Furthermore, it also triggers an alert if the driver is breaching the safe distance from the vehicle ahead. This algorithm has been successfully implemented in Altera DE0 FPGA and its functionality was validated via hardware experimental tests.…”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    The Determination of Pile Capacity Using Artificial Neural-net: An Optimization Approach by Ab. Malik, Rosely, Jamil S., Mohamed

    Published 2001
    “…Using the developed algorithm, the safety measures involved are such as reliability index and the probability of failure; instead of only factor of safety if conventional deterministic approach is used. …”
    Get full text
    Get full text
    Article
  3. 3

    Real-time Personal Protective Equipment (PPE) compliance detection system using you only look once version 5 / Nur Amielia Natasha Mohamad Nazli by Mohamad Nazli, Nur Amielia Natasha

    Published 2023
    “…Therefore, the objectives of this project involve design and implementation of a real-time PPE detection system, which aims to effectively monitor workers’ safety compliance. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    An autonomous wheelchair speed control using fuzzy logic controller / Muhammad Ashraf Mohamad Ghazali by Mohamad Ghazali, Muhammad Ashraf

    Published 2025
    “…Overall, the study validates the feasibility of implementing an FLC-based speed control system in autonomous wheelchairs, ensuring improved mobility, stability, and safety for users navigating various terrains. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Case driven TLC model checker analysis in energy scenario by Shkarupylo, Vadym, Blinov, Ihor V., Dusheba, Valentyna, Alsayaydeh, Jamil Abedalrahim Jamil

    Published 2023
    “…To foster the functional safety of corresponding program-algorithmic solutions, the model checking techniques and related tools are applied to the formal specifications of named solutions. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Modelling Autonomous Evacuation Navigation System (AENS) for optimal route using Dijkstra's algorithm by Abu Samah, Khyrina Airin Fariza

    Published 2016
    “…Through ST adaptation, all subsystems were integrated and using the “Dijkstra’s algorithm” (DA) by modifying its function from shortest path algorithm to safest and shortest algorithm, to the nearest exit. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    UTeM navigation system: pedestrian and traffic sign detection using CNN algorithm by Wan Bejuri, Wan Mohd Ya'akob, Harun, Muhammad Harraz, Mohamad, Abdul Karim

    Published 2022
    “…The system using algorithm using CNN as an algorithm and the architecture used is Tiny-YOLOv2 to detect traffic signs and pedestrians. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    A modified strength capacity for composite slab using reliability approach by Mohammed, Kachalla

    Published 2016
    “…First, composite deck safety performance against the load ratio function leads to safety bounds de_nitions that takes into consideration section slenderness and sheeting deck characteristics values delineated through l=6 and l=8, culminating in the formation of modi_ed strength function. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Analysis of Traffic Accident Patterns Using Association Rule Mining by Yudy, Pranata, Tri Basuki, Kurniawan, Edi Surya, Negara, Ahmad Haidar, Mirza

    Published 2024
    “…For example, analyzing variables at different accident levels allows policymakers to identify critical factors contributing to accidents, implement tailored safety measures, and prioritize infrastructure improvements. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Cloud-based lightweight detection of hardhat compliance based on YOLOv5 in power construction site by Wanbo, Luo

    Published 2025
    “…Therefore, it is necessary to provide real-time warnings when detecting workers without hardhats. Implementing deep learning-based object detection algorithms can facilitate the enforcement of hardhat-wearing compliance, thereby reducing work-related injuries and fatalities. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Functional Connectivity Assessment on Aging Brain using Functional Near Infrared Spectroscopy (fNIRS) by Chan, Yee Ling

    Published 2017
    “…To date, conventional diagnosis of Alzheimer’s disease (AD) using questionnaire are still widely implemented due to constraints of safety and costs in biochemical and neuroimaging approaches. …”
    Get full text
    Get full text
    Final Year Project
  14. 14

    Completion of contingency ranking selection (N-1) using ant colony optimization algorithm on 500 kV JAMALI system by Priyadi, Irnanda, Ramli, Kalamullah, Daratha, Novalio, Fathoni, Evan, Gunawan, Teddy Surya, Ihsanto, Eko

    Published 2022
    “…The ACO algorithm was implemented in this study through the initial parameter initialization stages, the probability value calculation stage, and the 0/1 knapsack problem calculation stage using the maximum cost function. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  15. 15
  16. 16

    Development of an algorithm for correlation of aircraft positioning data from radar and ADS-B sensors / Koh Che Hun by Koh , Che Hun

    Published 2019
    “…The Multi-radar Tracking System (MRTS) is implemented in aircraft surveillance with high confidence in terms of reliability and safety in Air Traffic Control (ATC) centers worldwide. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    Potential field methods and their inherent approaches for path planning by Omar, Rosli, Sabudin, E. N, C. K., Che Ku Melor, A., N. H

    Published 2016
    “…This paper reviews the traditional artificial potential field theory that has been modified with variety of algorithms based on potential field method that have been implemented to upgrade the potential function performance in obstacle avoidance and local minima problem.…”
    Get full text
    Get full text
    Article
  19. 19

    Deep Reinforcement Learning For Control by Bakar, Nurul Asyikin Abu

    Published 2021
    “…To generate the visual simulation in the simulator, the Python programming language is employed. The improved algorithm will help encourage the real-world implementation of DRL in many autonomous driving applications.…”
    Get full text
    Get full text
    Monograph
  20. 20

    Structural health monitoring using adaptive wavelet functions / Seyed Hossein Mahdavi by Seyed Hossein, Mahdavi

    Published 2016
    “…The developed scheme is comprehensive enough for use with any wavelet basis function. To investigate the applicability of different wavelet functions for different problems, in particular, the simple family of Haar wavelets, the complex and free-scaled Chebyshev wavelets of the first (FCW) and second kind (SCW) and Legendre wavelets (LW) have been evaluated. …”
    Get full text
    Get full text
    Thesis