Search Results - (( data implication sensor algorithm ) OR ( _ validation using algorithm ))
Search alternatives:
- data implication »
- sensor algorithm »
- validation using »
- using algorithm »
-
1
Framework for pedestrian walking behaviour recognition to minimize road accident
Published 2021“…Secondly, four different testing scenarios are chosen to acquire pedestrian walking data using the gyroscope sensor, where the essential features were extracted and selected. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
Framework for pedestrian walking behaviour recognition to minimize road accident
Published 2021“…Secondly, four different testing scenarios are chosen to acquire pedestrian walking data using the gyroscope sensor, where the essential features were extracted and selected. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
3
Evaluation of a spacecraft attitude and rate estimation algorithm
Published 2010“…Design/methodology/approach: The algorithm requires only geomagnetic field data and can be used as a low‐cost alternative or as a back‐up estimator in the case of attitude sensor failures. …”
Get full text
Get full text
Get full text
Article -
4
Smart site monitoring system / Muhammad Azmi and Muhammad Naim Mahyuddin
Published 2023“…These devices collect and transmit data to a centralised cloud-based platform. Advanced data analytics and machine learning algorithms process this data, enabling the system to detect potential safety hazards, monitor construction progress, and predict resource requirements. …”
Get full text
Get full text
Conference or Workshop Item -
5
Smart Glove for Sign Language Translation
Published 2023“…The Smart Glove utilizes only one sensor, flex sensors, to capture hand movements and gestures. …”
Get full text
Get full text
Get full text
Article -
6
Enhance Luhn algorithm for validation of identity card numbers (ID card)
Published 2013“…The enhancement is expected to be useful for many sites that use the algorithm.…”
Get full text
Get full text
Get full text
Article -
7
Enhance luhn algorithm for validation of credit cards numbers.
Published 2013“…The Luhn algorithm is the first line of defense in many e-commerce sites and is used to validate a variety of identification numbers such as credit card numbers. …”
Get full text
Get full text
Get full text
Article -
8
Cluster validity of the fuzzy C-means algorithm in mammographic image using adaptive cluster & partition entropy indexes / Azwani Aziz
Published 2010“…This problem can be solved by cluster validity index. Cluster validity index is needed to find the suitable number of cluster, c in any fuzzy clustering algorithm. …”
Get full text
Get full text
Thesis -
9
-
10
Validation on an enhanced dendrite cell algorithm using statistical analysis
Published 2017“…This study demonstrates the mechanism of evaluating an enhanced algorithm using performance metrics and validated it using statistical analysis. …”
Get full text
Get full text
Get full text
Article -
11
Implementation of New Improved Round Robin (NIRR) CPU scheduling algorithm using discrete event simulation
Published 2015“…Round Robin scheduling algorithm is the most widely used scheduling algorithm because of its simplicity and fairness. …”
Get full text
Get full text
Thesis -
12
Implementation of New Improved Round Robin (NIRR) CPU scheduling algorithm using discrete event simulation
Published 2016“…Round Robin scheduling algorithm is the most widely used scheduling algorithm because of its simplicity and fairness [1]. …”
Get full text
Get full text
Get full text
Article -
13
Optimization of assembly line balancing with energy efficiency by using tiki-taka algorithm
Published 2023“…Lastly, a study of the industrial case was performed as a validation of the developed model and algorithm. An automotive company is selected, and the collected actual data is used for validation purposes. …”
Get full text
Get full text
Thesis -
14
Prediction of Machine Failure by Using Machine Learning Algorithm
Published 2019“…The columns consist of the variables that record the reading of machine sensor tags. Validation for the model is analyzed by using validation testing data and cross validation. …”
Get full text
Get full text
Final Year Project -
15
Key schedule algorithm based on coordinate geometry of a three-dimensional hybrid cube
Published 2019“…Therefore, it can be concluded that the strength and validity of KSAHC algorithm have been enhanced as compared to other algorithms and can serve as the alternative algorithm in designing security systems.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
16
System identification using Extended Kalman Filter
Published 2017“…In order to evaluate the performance of the EKF learning algorithm, the proposed algorithm validation were analyzed using model validation methods as a checker such as One Step Ahead (OSA) and correlation coefficient (R2). …”
Get full text
Get full text
Student Project -
17
Phylogenetic tree classification system using machine learning algorithm
Published 2015“…The leave-out one cross-validation was used to calculate the accuracy of each feature. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
18
A Test Vector Minimization Algorithm Based On Delta Debugging For Post-Silicon Validation Of Pcie Rootport
Published 2017“…However, manual debugging is still widely used in post-silicon validation and is a major bottleneck in the validation process. …”
Get full text
Get full text
Thesis -
19
Performance of Semi Active Lateral Control (SALC) algorithm for semi active suspension system in multibody co-simulation method / M. M. Abdul Majid ...[et al.]
Published 2018“…The experimental data used for simulation model correlation and validation. …”
Get full text
Get full text
Article -
20
Priority and dynamic quantum time algorithms for central processing unit scheduling
Published 2018“…Central Processing Unit is scheduled using different types of scheduling algorithms. One of the most widely algorithm used in scheduling with sharing and batch operating systems is Round Robin. …”
Get full text
Get full text
Thesis
