Search Results - (( mobile implications _ algorithm ) OR ( wave application clustering algorithm ))*
Search alternatives:
- application clustering »
- mobile implications »
- wave application »
-
1
Pattern Recognition Approach Of Stress Wave Propagation In Carbon Steel Tubes For Defect Detection
Published 2015“…The signals were then clustered using the feature extraction algorithms. …”
Get full text
Get full text
Get full text
Article -
2
-
3
-
4
Parameter estimation and outlier detection for some types of circular model / Siti Zanariah binti Satari
Published 2015“…Here, we introduce a measure of similarity based on the circular distance and obtain a cluster tree using the single linkage clustering algorithm. …”
Get full text
Get full text
Thesis -
5
-
6
UTeM navigation system: pedestrian and traffic sign detection using CNN algorithm
Published 2022“…In conclusion, our system was proven to be a valuable solution for the mobile navigation system. In addition, it is implicated to educate the driver community to be a responsible and alert drivers.…”
Get full text
Get full text
Get full text
Article -
7
Obstacle Avoidance of a Mobile Robot Using Fuzzy Logic Control
Published 1999“…Moreover, two different implication methods (Mamdani minimum and Mamdani Product) implications are used in the interpretation of the IF-THEN rules in the rule-base. …”
Get full text
Get full text
Thesis -
8
Enhancing smart city mobility using Software Defined Networks
Published 2024“…SDN-based MM can advance sustainable urban development by centralizing control, adapting to changes, optimizing resource allocation, reducing energy consumption, and improving urban mobility. This paper investigates SDN's role in enhancing urban sustainability and analyzes its implications for sustainable cities. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
9
Framework for pedestrian walking behaviour recognition to minimize road accident
Published 2021“…In the methodology, this study discloses five useful stages. Firstly, mobile phone users' irregular walking behaviour is investigated using a questionnaire to determine their options on mobile usage in the street. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
Framework for pedestrian walking behaviour recognition to minimize road accident
Published 2021“…In the methodology, this study discloses five useful stages. Firstly, mobile phone users' irregular walking behaviour is investigated using a questionnaire to determine their options on mobile usage in the street. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
HandGestureSense: Hand gesture recognition-controlled smart home automation
Published 2024“…The proposal has important implications for people with limited mobility or disabilities, allowing them to easily navigate and manage their living spaces. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
12
HandGestureSense: Hand gesture recognition-controlled smart home automation
Published 2024“…The proposal has important implications for people with limited mobility or disabilities, allowing them to easily navigate and manage their living spaces. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
13
Drowsiness detection and alert system using face recognition with Raspberry Pi / Nur Syazwina Mohd Fadzalisham, Nor Adora Endut and Muhammad Nizamuddin Rosli
Published 2023“…Recently, drowsiness detection has garnered significant attention due to its crucial implications in various industries, such as transportation, healthcare, and workplace safety. …”
Get full text
Get full text
Book Section -
14
Drowsiness detection and alert system using face recognition with Raspberry Pi / Nur Syazwina Mohd Fadzalisham, Nor Adora Endut and Muhammad Nizamuddin Rosli
Published 2023“…Recently, drowsiness detection has garnered significant attention due to its crucial implications in various industries, such as transportation, healthcare, and workplace safety. …”
Get full text
Get full text
Book Section -
15
A framework for a multi-layered security of an automated programming code assessment tool
Published 2024journal::journal article
