Search Results - (( using verification sensor algorithm ) OR ( java application path algorithm ))

Refine Results
  1. 1

    Smart appointment organizer for mobile application / Mohd Syafiq Adam by Adam, Mohd Syafiq

    Published 2009
    “…In creating this application, NetBeans IDE 6.5and Java Micro Edition (Java ME) are used. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Visdom: Smart guide robot for visually impaired people by Lee, Zhen Ting

    Published 2025
    “…The system architecture integrates ROS 2 on a Raspberry Pi, with TCP/IP connectivity enabling remote operation. An Android mobile application, developed using Java and the java.net.Socket library, provides an intuitive and accessible user interface for seamless interaction with the robot. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  3. 3

    Visdom: Smart guide robot for visually impaired people by Lee, Zhen Ting

    Published 2025
    “…The system architecture integrates ROS 2 on a Raspberry Pi, with TCP/IP connectivity enabling remote operation. An Android mobile application, developed using Java and the java.net.Socket library, provides an intuitive and accessible user interface for seamless interaction with the robot. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  4. 4

    Sensor-less vector control using adaptive observer scheme for controlling the performance of the induction motor / Mazhar Hussain Abbasi by Mazhar, Hussain Abbasi

    Published 2013
    “…Simulation is done by using the observer which uses optimal feedback gain as an example of process from algorithm design to verification of logic. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Detecting sybil attacks in clustered wireless sensor networks based on energy trust system (ETS) by Alsaedi, Noor, Hashim, Fazirulhisyam, Sali, Aduwati, Rokhani, Fakhrul Zaman

    Published 2017
    “…It employs multi-level detection based on identity and position verification. Then, a trust algorithm is applied based on the energy of each sensor node. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    An enhanced fingerprint template protection scheme by Siswanto, Apri

    Published 2022
    “…Furthermore, an improved chaos-based encryption algorithm was proposed for encrypting FT. The MATLAB simulation with Fingerprint Verification Competition (FVC) 2002 database was used to measure the encryption results, secret key spaces, key sensitivity, histogram, correlation, differential, entropy information, matching/recognition analysis, and revocability. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Robust multi-gateway authentication scheme for agriculture wireless sensor network in society 5.0 smart communities by Khalid, Haqi, Hashim, Shaiful Jahari, Syed Ahmad, Sharifah Mumtazah, Hashim, Fazirulhisyam, Chaudhary, Muhammad Akmal

    Published 2021
    “…This work proposes a new authentication scheme for agriculture professionals based on a multi-gateway communication model using a fuzzy extractor algorithm to support the Society 5.0 environment. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8
  9. 9

    Autonomous flight algorithm of a quadcopter sensing system for methane gas concentration measurements at landfill site by Bashi, Omar Ibrahim Dallal

    Published 2018
    “…During the experimentation, accurate methane gas concentration measurements at landfill sites were obtained using the algorithm for autonomous flight, with the implementation of optimal quadcopter flight parameters and gas sensor mounting arrangements. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Development of optimized damage prediction method for health monitoring of ultra high performance fiber-reinforced concrete communication tower by Gatea, Sarah Jabbar

    Published 2018
    “…Therefore, this study aims to develop a new health monitoring system for communication towers based on AdaBoost, Bagging, and RUSBoost algorithms as hybrid algorithm, which can predict the damage by using noisy, random, unstable, and skewed frequency data with high accuracy. …”
    Get full text
    Get full text
    Thesis
  11. 11

    A single measurement of combined Direct and indirect MPPT algorithm for mismatch PV module application / Mohd Najib Mohd Hussain by Mohd Hussain, Mohd Najib

    Published 2016
    “…The use of module integrated converter (MIC) topologies for photovoltaic (PV) system is to harvest the maximum power point of PV module from solar irradiance. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Validation process for electrical charge tomography system using digital imaging technique by Isa, Mohd Daud, Rahmat, Mohd Fua'ad, Jusoff, Kamaruzaman, Raja Hussin, Tengku Ahmad Badrul Shah

    Published 2009
    “…Numerical analysis result based on data measured by sensor indicates that the algorithm is efficient to overcome the numerical instability. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    A study on obstacle detection for IoT based automated guided vehicle (AGV) by Loh, Jit Hao, M. Nafis, O. Z.

    Published 2022
    “…In order to improve obstacle detection in the AGV prototype, Kalman Filtering (KF) algorithm is used in the signal filtering for the HC-SR04 Ultrasonic Sensor data acquisition. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Internet of Things-based Home Automation with Network Mapper and MQTT Protocol by Alam T., Rokonuzzaman M., Sarker S., Abadin A.F.M.Z., Debnath T., Hossain M.I.

    Published 2025
    “…The proposed system is developed using a Raspberry Pi 3 Home Server (RHS) driven by the Support Vector Machine (SVM) algorithm. …”
    Article
  15. 15

    Smart room system with dual authentication by Harun, Muhammad Hazmi, Abdul Rahid@Abdul Rashid, Nurul Najwa

    Published 2025
    “…A numeric keypad for password entry after face verification, a solenoid sensor for door locking, an LED light that can be controlled remotely via a mobile application, a buzzer for detecting failed attempts, and a DHT11 sensor for humidity and temperature monitoring inside the smart room are all equipment of additional IoT hardware. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…Ultimately, the algorithm development program designed earlier is linked up directly to the robotic model for program implementation and verification. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Secure payment parking system (SPS) with Excel database software / Syed Luqman Putra Syed Putra Zainol Alam by Syed Putra Zainol Alam, Syed Luqman Putra

    Published 2024
    “…Also this project can develop an intelligent online parking payment system that allows users to conveniently check-in using QR code thus making online payment and exit the system with an exit gateway verification code. …”
    Get full text
    Get full text
    Student Project
  18. 18
  19. 19

    Pile Capacity Checking Tool based on Distributed Fibre Optic Sensing for Instrumented Pile Load Test by Beddelee, A.A.A.M., Mohamad, H., Tee, B.P.

    Published 2023
    “…Currently, the verification is done by comparing the pile capacity assessed from DOFS data to the analysis from the commercially available numerical software. …”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Assessment of topographic mapping by using digital camera, digital consumer grade camera and Aster 30 in term of accuracy and quality in kampung Asam Kubang, Taiping, perak / Abdul... by Abd Ghani, Abdul Wafi

    Published 2018
    “…For the VP (Verification Points), there is 30 points in total that is observed with Topcon GR5 by using the RTK (Real Time Kinematics) method. …”
    Get full text
    Get full text
    Thesis