Search Results - (( mobile evaluation step algorithm ) OR ( panel automation system algorithm ))
Search alternatives:
- mobile evaluation »
- automation system »
- panel automation »
- system algorithm »
- evaluation step »
- step algorithm »
-
1
Integration Of Machine Vision In Industrial Robot For Automated Composite Panel Punching
Published 2018“…Position and rotation of panels are compared to three coordinate systems which are camera, workpiece and machining center. …”
Get full text
Get full text
Thesis -
2
-
3
A coalition model for efficient indexing in wireless sensor network with random mobility / Hazem Jihad Ali Badarneh
Published 2021“…The second evaluation divides into three scenarios. The first one evaluates Coalition-Based Index-Tree framework independently, without any effect from Dynamic-Coalition framework and Static-Coalition algorithm. …”
Get full text
Get full text
Get full text
Thesis -
4
The implementation of fault management in distribution system using distribution automation system (DAS) in conjunction with SCADA
Published 2012“…Therefore, the implementation of proper fault management is highly important to be utilized such as by applying automation system in distribution system. Up to date, in Malaysia there is no automation technique being used for maintenance work in distribution system. …”
Get full text
Get full text
Conference or Workshop Item -
5
A real-time integrated fire detection and alarm (FDA) system for network based building automation
Published 2017“…This work proposes an improved framework for FDA system to ensure a robust, intelligent network of FDA control panels in real-time. …”
Get full text
Get full text
Get full text
Article -
6
Network-based real-time integrated Fire Detection and Alarm (FDA) system with building automation
Published 2017“…This work proposes an improved framework for FDA system to ensure a robust intelligent network of FDA control panels in real-time. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
7
Implementation of hashed cryptography algorithm based on cryptography message syntax
Published 2019“…The important study in this research is an automated learning system for deep learning to enhance security. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
Automatic Number Plate Recognition on android platform: With some Java code excerpts
Published 2016“…Performance of the proposed algorithm was evaluated on the developed number plates’ image database captured by mobile phone’s camera, i.e. 30 images. …”
Get full text
Get full text
Get full text
Book -
9
User interface and interactivity design guidelines of algorithm visualization on mobile platform
Published 2019“…Algorithm Visualization (AV) is a pedagogical tool that can help learners to see the animation of the step-by-step process of an algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
Advanced solar tracking system with temperature control and real-time monitoring
Published 2025“…These algorithms dynamically control the servo motor, relay module, and LCD display, adapting the system based on environmental conditions. …”
Get full text
Get full text
Book Section -
11
Investigations On Human Perceptual Maps Using A Stereo-Vision Mobile Robot
Published 2018“…The main contribution of this research is on the use of computer vision techniques and computational mapping algorithms on a stereo-vision mobile robot for formulating the human perceptual map systematically, and evaluating the resulting human perceptual maps pertaining to both indoor and outdoor environments comprehensively. …”
Get full text
Get full text
Thesis -
12
-
13
Development of hybrid artificial intelligent based handover decision algorithm
Published 2017“…The performance of the newly developed k � step ahead ANN based RSS prediction algorithm was evaluated using simulated and real data acquired from available mobile communication networks. …”
Get full text
Get full text
Get full text
Get full text
Article -
14
Analytical method for forensic investigation of social networking applications on smartphones
Published 2016“…We hope this research can be a stepping stone for identifying a common methodology for investigation of all types of smartphone applications and serve as the first step toward developing a consistent digital forensic framework for social networking such as the one proposed and evaluated in this research.…”
Get full text
Get full text
Get full text
Thesis -
15
Hybrid intelligent approach for network intrusion detection
Published 2015“…Clustering is the last step of processing before classification has been performed, using k-means algorithm. …”
Get full text
Get full text
Get full text
Thesis -
16
Image classification of Aedes mosquitoes using transfer learning / Zetty Ilham Abdullah
Published 2021“…The architecture is also evaluated based on the performance produced by experiments conducted using different combination of hyperparameters. …”
Get full text
Get full text
Thesis -
17
Framework for stream clustering of trajectories based on temporal micro clustering technique
Published 2018“…A comprehensive experimental analysis was conducted to evaluate the efficiency and effectiveness of the proposed algorithms (ONF-TRS, CC-TRS). …”
Get full text
Get full text
Thesis -
18
Re: Gen - web-based resume generator with content recommender for it job field / Nurul Syahmina Mohd Khairuddin … [et al.]
Published 2022“…Waterfall model has been chosen as the methodology because the project is being developed step by step from requirement gathering and analysis to testing and evaluation. …”
Get full text
Get full text
Get full text
Book Section -
19
ReSTiNet: An efficient deep learning approach to improve human detection accuracy
Published 2023“… • All the necessary steps, algorithms, and mathematical formulas for building the net- work are provided…”
Get full text
Get full text
Get full text
Article -
20
ReSTiNet: An Efficient Deep Learning Approach to Improve Human Detection Accuracy
Published 2023“…The validation of the proposed ReSTiNet model has been done on INRIA person dataset using the Tesla K80. â�¢ All the necessary steps, algorithms, and mathematical formulas for building the net- work are provided. â�¢ The network is small in size but has a faster detection speed with high accuracy. …”
Get full text
Get full text
Article
