Search Results - (( user evaluation sensor algorithm ) OR ( panel extraction path algorithm ))

Refine Results
  1. 1

    Secure ACO-Based Wireless Sensor Network Routing Algorithm for IoT by Sharmin, Afsah, Anwar, Farhat, Motakabber, S. M. A., Hassan Abdalla Hashim, Aisha

    Published 2021
    “…The perception of ensuring security is expensive in terms of computation, power and user-interface components because of low-power IoT objects or sensor nodes. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  2. 2
  3. 3
  4. 4

    Integrated multi sensors and camera video sequence application for performance monitoring in archery by Taha, Z., Mat-Jizat, J.A., Abdullah, M.A., Musa, R.M., Abdullah, M.R., Ibrahim, M.F., Shaharudin, M.A.H.

    Published 2018
    “…The three camera views with the five body sensors are integrated into a single computer application which enables the user to view all the data in a single user interface. …”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    A comparison study of classifier algorithms for mobile-phone’s accelerometer based activity recognition by Ayu, Media Anugerah, Ismail, Siti Aisyah, Abdul Matin, Ahmad Faridi, Mantoro, Teddy

    Published 2012
    “…As a continuation of the research towards the search for a suitable and reliable algorithm for real-time activity recognition using mobile phone, an evaluation and comparison study of the performance of seven different categories of classifier algorithms in classifying user activities were conducted. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6
  7. 7

    AUTOMATED GUIDED ROBOT (AGR) by Abd Rahim, Mohd Azlan Shah

    Published 2007
    “…Algorithm conversion to C code programming has been done throughout the project for the obstacle avoidance and path planning algorithms based upon the GA platform ofAI.…”
    Get full text
    Get full text
    Final Year Project
  8. 8

    Optimizing Cloud Storage Costs: Introducing the Pre-Evaluation-Based Cost Optimization (PECSCO) Mechanism by Alomari M.F., Mahmoud M.A., Gharaei N., Rasool S.M., Hasan R.A.

    Published 2025
    “…The core of the algorithm utilizes a Genetic Algorithm (GA) to find the optimal position for the first evaluator by minimizing the total distance between this evaluator and all CCTV nodes, aiming for surveillance efficiency. …”
    Conference paper
  9. 9

    Jogging activity recognition using k-NN algorithm by Afifah Ismail

    Published 2022
    “…Jogging activity recognition using the k-NN algorithm is a system that can help users collect information data of user speed movement using speed sensor and give the classification of jogging activity to the user. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  10. 10

    Mobile data gathering algorithms for wireless sensor networks by Ghaleb, Mukhtar Mahmoud Yahya

    Published 2014
    “…In this algorithm, the user has to tune an appropriate variable which directly affects the power consumption and the data gathering latency. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Self-calibration algorithm for a pressure sensor with a real-time approach based on an artificial neural network by M. Almassri, Ahmed M., Wan Hasan, Wan Zuha, Ahmad, Siti Anom, Shafie, Suhaidi, Wada, Chikamune, Horio, Keiichi

    Published 2018
    “…The self-calibration algorithm should be able to fix major problems in the pressure sensor such as hysteresis, variation in gain and lack of linearity with high accuracy. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Integrated multi sensors and camera video sequence application for performance monitoring in archery by Zahari, Taha, Jessnor Arif, Mat-Jizat, Muhammad Amirul, Abdullah, Mohamad Razali, Abdullah, Musa, Rabiu Muazu, Mohamad Fauzi, Ibrahim, Mohd Ali Hanafiah, Shaharudin

    Published 2017
    “…The three camera views with the five body sensors are integrated into a single computer application which enables the user to view all the data in a single user interface. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Integrated multi sensors and camera video sequence application for performance monitoring in archery by Taha, Z., Mat-Jizat, J.A., Abdullah, M.A., Musa, R.M., Abdullah, M.R., Ibrahim, M.F., Shaharudin, M.A.H.

    Published 2018
    “…The three camera views with the five body sensors are integrated into a single computer application which enables the user to view all the data in a single user interface. …”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Study of hand gesture recognition using impulse radio ultra wideband (IRUWB) radar sensor by Terence Jerome Daim

    Published 2023
    “…The developed algorithms interpret raw IR-UWB radar sensor data and associate it with specific hand gestures, addressing the core objective of gesture recognition. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    A secure trust aware ACO-Based WSN routing protocol for IoT by Sharmin, Afsah, Anwar, Farhat, Motakabber, S. M. A., Hassan Abdalla Hashim, Aisha

    Published 2022
    “…To secure IoT networks from routing attacks, a secure trust aware ACO-based WSN routing protocol for IoT is proposed here that establishes secure routing with trustworthy nodes. The trust evaluation system, is enhanced to evaluate the node trust value, identify sensor node misbehavior, and maximize energy conservation. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Real time self-calibration algorithm of pressure sensor for robotic hand glove system by Almassri, Ahmed M. M.

    Published 2019
    “…This provides a useful methodology for the user to evaluate the performance of any measurement system in a real-time environment.…”
    Get full text
    Get full text
    Thesis
  17. 17

    Multi-source data fusion framework for remote triaging and prioritization in telemedicine by Salman, Omar Hussein

    Published 2015
    “…As telemedicine consists of three tiers (Sensors/ sources, Base station and Server), the simulation of the proposed frameworks as fusion algorithm in the base station and as healthcare services algorithm in the server was demonstrated. …”
    Get full text
    Get full text
    Thesis
  18. 18

    An enhanced fingerprint template protection scheme by Siswanto, Apri

    Published 2022
    “…Fingerprint template protection (FTP) is required to secure authentication due to fingerprint has been widely used for user authentication systems. Fingerprint authentication consists of a microcontroller, fingerprint sensor, secure access control, and human interface. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    The development of an automated pattern recognition based on neural network / Irni Hamiza Hamzah, Mohammad Nizam Ibrahim and Linda Mohd Kasim by Hamzah, Irni Hamiza, Ibrahim, Mohammad Nizam, Mohd Kasim, Linda

    Published 2006
    “…The capability of powerful personal computers and affordable and high resolution sensors (i.e.: CCD cameras, microphones and scanners) have fostered the development of pattern recognition algorithms in new application domains (i.e.: fuzzy logic, neural network and genetic algorithm). …”
    Get full text
    Get full text
    Research Reports