Search Results - (( motion location based algorithm ) OR ( user identification using algorithm ))*

Refine Results
  1. 1

    Design and Fabrication of Smart Home With Internet of Things Enabled Automation System by Jabbar, Waheb A., Tee, Kok Kian, Roshahliza, M. Ramli, Siti Nabila, Zubir, Nurthaqifah, S. M. Zamrizaman, Balfaqih, Mohammed, Shepelev, Vladimir, Alharbi, Soltan

    Published 2019
    “…The collected data from several sensors (radio-frequency identification, ultrasonic, temperature, humidity, gas, and motion sensors) can be accessed via If This Then That (IFTTT) on users’ devices (smartphones and/or laptops) over the Internet regardless of their location. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2
  3. 3

    Performance evaluation on mitral valve motion feature tracking using kanade-lucas-Tomasi (KLT) algorithm based eigenvalue measurement by Mahadi, Lina Farhana, Ibrahim, Nabilah, Zaluwi, Mohd Thariq, S.M Johan, Muhammad Haniff

    Published 2019
    “…This paper provides the explanation of the concepts of point tracking technique to be implemented in mitral valve locating in video frames. Object tracking has been used for many applications in motion-based recognition and monitoring. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4
  5. 5

    Performance evaluation on mitral valve motion feature tracking using Kanade-Lucas- Tomasi (KLT) algorithm based eigenvalue measurement by Mahadi, Lina Farhana, Ibrahim, Nabilah, Zaluwi, Mohd Thariq, S.M Johan, Muhammad Haniff

    Published 2019
    “…This paper provides the explanation of the concepts of point tracking technique to be implemented in mitral valve locating in video frames. Object tracking has been used for many applications in motion-based recognition and monitoring. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Mobile robot navigation using GPS to solve target location achieving problem / Saiful Zaimy Yahaya, Rozan Boudville and Mohamad Faizal Abdul Rahman by Yahaya, Saiful Zaimy, Boudville, Rozan, Abdul Rahman, Mohamad Faizal

    Published 2010
    “…The hardware consists of two DC brushless motor with four rear wheels to provide motion to the robot. The hardware design that has been chosen is basically based on military tank concept and used different drives system to trigger the motion. …”
    Get full text
    Get full text
    Research Reports
  7. 7

    Effective predicate identification algorithm for XML retrieval by Roko, Abubakar, C. Doraisamy, Shyamala, Nakone, Bello

    Published 2018
    “…Finally, an effective predicate identification algorithm (EPIA) which uses EBQS and STPS to return relevant predicates is introduced. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Application Of Multi-Layer Perceptron Technique To Detect And Locate The Base Of A Young Corn Plant by Morshidi, Malik Arman

    Published 2007
    “…In this research, a vision system algorithm has been developed to identify and locate base of young corn trees based upon robot vision technology, pattern recognition techniques, and knowledge-based decision theory. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Block matching algorithms for motion estimation using modified Cross-Diamond-Hexagonal search / Abd Razak Mahmud by Mahmud, Abd Razak

    Published 2008
    “…A modified of Cross-Diamond-Hexagonal search (MCDHS) based on the Cross-Diamond-Hexagonal search (CDHS) is proposed to match or increase the performance of the Peak-signal-to-noise ratio (PSNR) and reduce the computational complexity of previous motion estimation techniques such as Three Step search (TSS), Simple and Efficient Three Step search (SESTSS), New Three Step search (NTSS), Four . …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Effective query structuring with ranking using named entity categories for XML retrieval by Roko, Abubakar

    Published 2016
    “…Furthermore, it employs Predicates Identification Algorithm (PIA) and Entity Identification Algorithm (EIA) to identify user search intention. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Vibration-based structural damage detection and system identification using wavelet multiresolution analysis / Seyed Alireza Ravanfar by Seyed Alireza, Ravanfar

    Published 2017
    “…Results indicate that the wavelet-based damage detection method precisely identified the location and severity of damages even without reference data. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    Eeg-Based Person Identification Using Multi-Levelwavelet Decomposition With Multi-Objective Flower Pollination Algorithm by Yahya Alyasseri, Zaid Abdi Alkareem

    Published 2020
    “…For addressing these points, a novel person identification method that is using EEG with multi-level wavelet decomposition and multi-objective flower pollination algorithm is proposed in this thesis. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Effects of user selected conditions on modeling of dynamic systems using adaptive fuzzy model by Yaacob, Mohd. Shafiek, Jamaluddin, Hishamuddin

    Published 2001
    “…The implementation and the computational aspects of the training algorithm are also highlighted. Three examples of discrete-time nonlinear systems are used in the simulation study to show the effects of user selected conditions on the identification process. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16
  17. 17

    Guidance and control for satellite in-orbit-self-assembly proximity operations by Okasha, Mohamed Elsayed Aly Abd Elaziz, Park, Chandeok, Park, Sang-Young

    Published 2015
    “…Guidance and control algorithms are developed based on the closed-form analytical solution of relative motion equations that is completely explicit in time in a general Keplerian orbit. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Smart cards and the fingerprint: a framework for user identification and authentication by Omar, M. H., Din, Roshidi, Tahir, H. M.

    Published 2003
    “…As a result, the research proposed a framework for user identification and authentication in automatic-teller-machine (ATM) systems using fingerprints and smart cards as opposed to the PIN and magnetic-stripe cards.…”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Tag clouds algorithm with the inclusion of personality traits by Ahmad Affandi, Supli

    Published 2015
    “…This algorithm is beneficial for decision making using information visualization in which personality traits of the user are heavily inclined. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Identifying the influential spreaders in multilayer interactions of online social networks by Al-Garadi, M.A., Varathan, Kasturi Dewi, Ravana, S.D., Ahmed, E., Chang, V.

    Published 2016
    “…The measurement results are found to be more reliable when the identification algorithms are applied to proposed topological representation compared when these algorithms are applied to single layer representations.…”
    Get full text
    Get full text
    Article