Search Results - (( variable _ ((users algorithm) OR (sensor algorithm)) ) OR ( java application using algorithm ))

Refine Results
  1. 1

    Automated time series forecasting by Ismail, Suzilah, Zakaria, Rohaiza, Tuan Muda, Tuan Zalizam

    Published 2011
    “…Moving Average, Decomposition, Exponential Smoothing, Time Series Regressions and ARIMA) were used.The algorithm was developed in JAVA using up to date forecasting process such as data partition, several error measures and rolling process.Successfully, the results of the algorithm tally with the results of SPSS and Excel.This automatic forecasting will not just benefit forecaster but also end users who do not have in depth knowledge about forecasting techniques.…”
    Get full text
    Get full text
    Get full text
    Monograph
  2. 2

    Network game (Literati) / Chung Mei Kuen by Chung, Mei Kuen

    Published 2003
    “…It should be an interesting, time and value worth topic to research on. By using Java applet, it will give a good interactive response since it does not suffer from the delays or variability of bandwidth associated with network connection. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Mobile data gathering algorithms for wireless sensor networks by Ghaleb, Mukhtar Mahmoud Yahya

    Published 2014
    “…In this algorithm, the user has to tune an appropriate variable which directly affects the power consumption and the data gathering latency. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Algorithm enhancement for host-based intrusion detection system using discriminant analysis by Dahlan, Dahliyusmanto

    Published 2004
    “…Misuse detection algorithms model know attack behavior. They compare sensor data to attack patterns learned from the training data. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Prediction of Machine Failure by Using Machine Learning Algorithm by Fakhrurazi, Nur Amalina

    Published 2019
    “…Then, the data is cluster by using K Means to produce labeled input that will be trained by using Gradient Boosting Machine, a decision tree algorithm to make prediction. The columns consist of the variables that record the reading of machine sensor tags. …”
    Get full text
    Get full text
    Final Year Project
  6. 6

    A study on advanced statistical analysis for network anomaly detection by Ngadi, Md. Asri, Idris, Mohd. Yazid, Abdullah, Abd. Hanan

    Published 2005
    “…Misuse detection algorithms model know attack behavior. They compare sensor data to attack patterns learned from the training data. …”
    Get full text
    Monograph
  7. 7

    Self-calibration algorithm for a pressure sensor with a real-time approach based on an artificial neural network by M. Almassri, Ahmed M., Wan Hasan, Wan Zuha, Ahmad, Siti Anom, Shafie, Suhaidi, Wada, Chikamune, Horio, Keiichi

    Published 2018
    “…The self-calibration algorithm should be able to fix major problems in the pressure sensor such as hysteresis, variation in gain and lack of linearity with high accuracy. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Real time self-calibration algorithm of pressure sensor for robotic hand glove system by Almassri, Ahmed M. M.

    Published 2019
    “…This study investigates the use of a novel Proposed Self-Calibration Algorithm (PSCA) of multi pressure sensors in real time on robotic hand glove system. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Study of hand gesture recognition using impulse radio ultra wideband (IRUWB) radar sensor by Terence Jerome Daim

    Published 2023
    “…These include exploring recognition of gestures performed by two hands simultaneously, scalability to different environments, optimal sensor placement, and addressing user variability. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Integrated multi sensors and camera video sequence application for performance monitoring in archery by Taha, Z., Mat-Jizat, J.A., Abdullah, M.A., Musa, R.M., Abdullah, M.R., Ibrahim, M.F., Shaharudin, M.A.H.

    Published 2018
    “…The three camera views with the five body sensors are integrated into a single computer application which enables the user to view all the data in a single user interface. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Integrated multi sensors and camera video sequence application for performance monitoring in archery by Taha, Z., Mat-Jizat, J.A., Abdullah, M.A., Musa, R.M., Abdullah, M.R., Ibrahim, M.F., Shaharudin, M.A.H.

    Published 2018
    “…The three camera views with the five body sensors are integrated into a single computer application which enables the user to view all the data in a single user interface. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    An enhanced fingerprint template protection scheme by Siswanto, Apri

    Published 2022
    “…Fingerprint template protection (FTP) is required to secure authentication due to fingerprint has been widely used for user authentication systems. Fingerprint authentication consists of a microcontroller, fingerprint sensor, secure access control, and human interface. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Integrated multi sensors and camera video sequence application for performance monitoring in archery by Zahari, Taha, Jessnor Arif, Mat-Jizat, Muhammad Amirul, Abdullah, Mohamad Razali, Abdullah, Musa, Rabiu Muazu, Mohamad Fauzi, Ibrahim, Mohd Ali Hanafiah, Shaharudin

    Published 2017
    “…The three camera views with the five body sensors are integrated into a single computer application which enables the user to view all the data in a single user interface. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Improvement of land cover mapping using Sentinel 2 and Landsat 8 imageries via non-parametric classification by Myaser, Jwan

    Published 2020
    “…The results indicated that good classification performance depends on these factors. All algorithms showed more stability and accuracy when training size applied is more than 6% by the Equal Sample Rate (ESR) method with six variables. …”
    Get full text
    Get full text
    Thesis
  15. 15

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  16. 16
  17. 17
  18. 18

    Cluster head selection using fuzzy logic and chaotic based genetic algorithm in wireless sensor network by Karimi, Abbas, Abedini, S. M., Zarafshan, Faraneh, Syed Mohamed, Syed Abdul Rahman Al-Haddad

    Published 2013
    “…In this paper, fuzzy logic and chaotic based genetic algorithms are combined to extend the lifetime of sensor nodes. …”
    Get full text
    Get full text
    Article
  19. 19

    Real-Time Video Processing Using Native Programming on Android Platform by Saipullah, Khairul Muzzammil

    Published 2012
    “…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Modelling and analysis of sensor fault tolerant control using behavioral approach to systems theory by Ng, Peng Hong

    Published 2015
    “…Finally, the algorithm to obtain a general FTCS framework is developed to provide compensation of the sensor faults through the introduction of a new control law unto the existing nominal one. …”
    Get full text
    Get full text
    Get full text
    Thesis