Search Results - (( motion location based algorithm ) OR ( user identification using algorithm ))*
Search alternatives:
- identification using »
- user identification »
- motion location »
- using algorithm »
-
1
Design and Fabrication of Smart Home With Internet of Things Enabled Automation System
Published 2019“…The collected data from several sensors (radio-frequency identification, ultrasonic, temperature, humidity, gas, and motion sensors) can be accessed via If This Then That (IFTTT) on users’ devices (smartphones and/or laptops) over the Internet regardless of their location. …”
Get full text
Get full text
Get full text
Article -
2
-
3
Performance evaluation on mitral valve motion feature tracking using kanade-lucas-Tomasi (KLT) algorithm based eigenvalue measurement
Published 2019“…This paper provides the explanation of the concepts of point tracking technique to be implemented in mitral valve locating in video frames. Object tracking has been used for many applications in motion-based recognition and monitoring. …”
Get full text
Get full text
Get full text
Article -
4
-
5
Performance evaluation on mitral valve motion feature tracking using Kanade-Lucas- Tomasi (KLT) algorithm based eigenvalue measurement
Published 2019“…This paper provides the explanation of the concepts of point tracking technique to be implemented in mitral valve locating in video frames. Object tracking has been used for many applications in motion-based recognition and monitoring. …”
Get full text
Get full text
Get full text
Article -
6
Mobile robot navigation using GPS to solve target location achieving problem / Saiful Zaimy Yahaya, Rozan Boudville and Mohamad Faizal Abdul Rahman
Published 2010“…The hardware consists of two DC brushless motor with four rear wheels to provide motion to the robot. The hardware design that has been chosen is basically based on military tank concept and used different drives system to trigger the motion. …”
Get full text
Get full text
Research Reports -
7
Effective predicate identification algorithm for XML retrieval
Published 2018“…Finally, an effective predicate identification algorithm (EPIA) which uses EBQS and STPS to return relevant predicates is introduced. …”
Get full text
Get full text
Conference or Workshop Item -
8
Application Of Multi-Layer Perceptron Technique To Detect And Locate The Base Of A Young Corn Plant
Published 2007“…In this research, a vision system algorithm has been developed to identify and locate base of young corn trees based upon robot vision technology, pattern recognition techniques, and knowledge-based decision theory. …”
Get full text
Get full text
Thesis -
9
Block matching algorithms for motion estimation using modified Cross-Diamond-Hexagonal search / Abd Razak Mahmud
Published 2008“…A modified of Cross-Diamond-Hexagonal search (MCDHS) based on the Cross-Diamond-Hexagonal search (CDHS) is proposed to match or increase the performance of the Peak-signal-to-noise ratio (PSNR) and reduce the computational complexity of previous motion estimation techniques such as Three Step search (TSS), Simple and Efficient Three Step search (SESTSS), New Three Step search (NTSS), Four . …”
Get full text
Get full text
Thesis -
10
Autonomous reconnaissance mission: development of an algorithm for collaborative multi robot communication
Published 2010Get full text
Get full text
Proceeding Paper -
11
Effective query structuring with ranking using named entity categories for XML retrieval
Published 2016“…Furthermore, it employs Predicates Identification Algorithm (PIA) and Entity Identification Algorithm (EIA) to identify user search intention. …”
Get full text
Get full text
Get full text
Thesis -
12
Vibration-based structural damage detection and system identification using wavelet multiresolution analysis / Seyed Alireza Ravanfar
Published 2017“…Results indicate that the wavelet-based damage detection method precisely identified the location and severity of damages even without reference data. …”
Get full text
Get full text
Get full text
Thesis -
13
-
14
Eeg-Based Person Identification Using Multi-Levelwavelet Decomposition With Multi-Objective Flower Pollination Algorithm
Published 2020“…For addressing these points, a novel person identification method that is using EEG with multi-level wavelet decomposition and multi-objective flower pollination algorithm is proposed in this thesis. …”
Get full text
Get full text
Thesis -
15
Effects of user selected conditions on modeling of dynamic systems using adaptive fuzzy model
Published 2001“…The implementation and the computational aspects of the training algorithm are also highlighted. Three examples of discrete-time nonlinear systems are used in the simulation study to show the effects of user selected conditions on the identification process. …”
Get full text
Get full text
Get full text
Article -
16
An indoor based push notification for location-based marketing using bluetooth smart ready technology / Nur Farehah Alias
Published 2017“…Android smartphone is used in order to test this algorithm.…”
Get full text
Get full text
Thesis -
17
Guidance and control for satellite in-orbit-self-assembly proximity operations
Published 2015“…Guidance and control algorithms are developed based on the closed-form analytical solution of relative motion equations that is completely explicit in time in a general Keplerian orbit. …”
Get full text
Get full text
Get full text
Article -
18
Smart cards and the fingerprint: a framework for user identification and authentication
Published 2003“…As a result, the research proposed a framework for user identification and authentication in automatic-teller-machine (ATM) systems using fingerprints and smart cards as opposed to the PIN and magnetic-stripe cards.…”
Get full text
Get full text
Get full text
Article -
19
Tag clouds algorithm with the inclusion of personality traits
Published 2015“…This algorithm is beneficial for decision making using information visualization in which personality traits of the user are heavily inclined. …”
Get full text
Get full text
Get full text
Thesis -
20
Identifying the influential spreaders in multilayer interactions of online social networks
Published 2016“…The measurement results are found to be more reliable when the identification algorithms are applied to proposed topological representation compared when these algorithms are applied to single layer representations.…”
Get full text
Get full text
Article
