Search Results - (( using verification sensor algorithm ) OR ( java application path algorithm ))
Search alternatives:
- verification sensor »
- using verification »
- sensor algorithm »
- java application »
- application path »
- path algorithm »
-
1
Smart appointment organizer for mobile application / Mohd Syafiq Adam
Published 2009“…In creating this application, NetBeans IDE 6.5and Java Micro Edition (Java ME) are used. …”
Get full text
Get full text
Thesis -
2
Visdom: Smart guide robot for visually impaired people
Published 2025“…The system architecture integrates ROS 2 on a Raspberry Pi, with TCP/IP connectivity enabling remote operation. An Android mobile application, developed using Java and the java.net.Socket library, provides an intuitive and accessible user interface for seamless interaction with the robot. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
3
Visdom: Smart guide robot for visually impaired people
Published 2025“…The system architecture integrates ROS 2 on a Raspberry Pi, with TCP/IP connectivity enabling remote operation. An Android mobile application, developed using Java and the java.net.Socket library, provides an intuitive and accessible user interface for seamless interaction with the robot. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
4
Sensor-less vector control using adaptive observer scheme for controlling the performance of the induction motor / Mazhar Hussain Abbasi
Published 2013“…Simulation is done by using the observer which uses optimal feedback gain as an example of process from algorithm design to verification of logic. …”
Get full text
Get full text
Thesis -
5
Detecting sybil attacks in clustered wireless sensor networks based on energy trust system (ETS)
Published 2017“…It employs multi-level detection based on identity and position verification. Then, a trust algorithm is applied based on the energy of each sensor node. …”
Get full text
Get full text
Get full text
Article -
6
An enhanced fingerprint template protection scheme
Published 2022“…Furthermore, an improved chaos-based encryption algorithm was proposed for encrypting FT. The MATLAB simulation with Fingerprint Verification Competition (FVC) 2002 database was used to measure the encryption results, secret key spaces, key sensitivity, histogram, correlation, differential, entropy information, matching/recognition analysis, and revocability. …”
Get full text
Get full text
Thesis -
7
Robust multi-gateway authentication scheme for agriculture wireless sensor network in society 5.0 smart communities
Published 2021“…This work proposes a new authentication scheme for agriculture professionals based on a multi-gateway communication model using a fuzzy extractor algorithm to support the Society 5.0 environment. …”
Get full text
Get full text
Get full text
Article -
8
-
9
Autonomous flight algorithm of a quadcopter sensing system for methane gas concentration measurements at landfill site
Published 2018“…During the experimentation, accurate methane gas concentration measurements at landfill sites were obtained using the algorithm for autonomous flight, with the implementation of optimal quadcopter flight parameters and gas sensor mounting arrangements. …”
Get full text
Get full text
Thesis -
10
Development of optimized damage prediction method for health monitoring of ultra high performance fiber-reinforced concrete communication tower
Published 2018“…Therefore, this study aims to develop a new health monitoring system for communication towers based on AdaBoost, Bagging, and RUSBoost algorithms as hybrid algorithm, which can predict the damage by using noisy, random, unstable, and skewed frequency data with high accuracy. …”
Get full text
Get full text
Thesis -
11
A single measurement of combined Direct and indirect MPPT algorithm for mismatch PV module application / Mohd Najib Mohd Hussain
Published 2016“…The use of module integrated converter (MIC) topologies for photovoltaic (PV) system is to harvest the maximum power point of PV module from solar irradiance. …”
Get full text
Get full text
Thesis -
12
Validation process for electrical charge tomography system using digital imaging technique
Published 2009“…Numerical analysis result based on data measured by sensor indicates that the algorithm is efficient to overcome the numerical instability. …”
Get full text
Get full text
Get full text
Article -
13
A study on obstacle detection for IoT based automated guided vehicle (AGV)
Published 2022“…In order to improve obstacle detection in the AGV prototype, Kalman Filtering (KF) algorithm is used in the signal filtering for the HC-SR04 Ultrasonic Sensor data acquisition. …”
Get full text
Get full text
Get full text
Article -
14
Internet of Things-based Home Automation with Network Mapper and MQTT Protocol
Published 2025“…The proposed system is developed using a Raspberry Pi 3 Home Server (RHS) driven by the Support Vector Machine (SVM) algorithm. …”
Article -
15
Smart room system with dual authentication
Published 2025“…A numeric keypad for password entry after face verification, a solenoid sensor for door locking, an LED light that can be controlled remotely via a mobile application, a buzzer for detecting failed attempts, and a DHT11 sensor for humidity and temperature monitoring inside the smart room are all equipment of additional IoT hardware. …”
Get full text
Get full text
Get full text
Article -
16
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Ultimately, the algorithm development program designed earlier is linked up directly to the robotic model for program implementation and verification. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Secure payment parking system (SPS) with Excel database software / Syed Luqman Putra Syed Putra Zainol Alam
Published 2024“…Also this project can develop an intelligent online parking payment system that allows users to conveniently check-in using QR code thus making online payment and exit the system with an exit gateway verification code. …”
Get full text
Get full text
Student Project -
18
-
19
Pile Capacity Checking Tool based on Distributed Fibre Optic Sensing for Instrumented Pile Load Test
Published 2023“…Currently, the verification is done by comparing the pile capacity assessed from DOFS data to the analysis from the commercially available numerical software. …”
Get full text
Get full text
Conference or Workshop Item -
20
Assessment of topographic mapping by using digital camera, digital consumer grade camera and Aster 30 in term of accuracy and quality in kampung Asam Kubang, Taiping, perak / Abdul...
Published 2018“…For the VP (Verification Points), there is 30 points in total that is observed with Topcon GR5 by using the RTK (Real Time Kinematics) method. …”
Get full text
Get full text
Thesis
