- Human Pose and Action Recognition
- Robotic Path Planning Algorithms
- IoT and Edge/Fog Computing
- Martial Arts: Techniques, Psychology, and Education
- Peer-to-Peer Network Technologies
- Robotics and Sensor-Based Localization
- Caching and Content Delivery
- Cloud Computing and Resource Management
- Control and Dynamics of Mobile Robots
- Smart Parking Systems Research
- Software System Performance and Reliability
- Video Analysis and Summarization
- RFID technology advancements
- Advanced Steganography and Watermarking Techniques
- Food Supply Chain Traceability
- Digital Media Forensic Detection
- Image Retrieval and Classification Techniques
- Mobile and Web Applications
- Engineering Education and Technology
- Water Quality Monitoring Technologies
- Biomedical Text Mining and Ontologies
- Human Motion and Animation
- Software Engineering Techniques and Practices
- Advanced Data Storage Technologies
- Artificial Intelligence in Games
Sultan Zainal Abidin University
2015-2024
The problem of water pollution is increasing every day, due to the industries’ waste product disposal, migration people from rural urban areas, crowded population, untreated sewage wastewater and other harmful chemicals’ discharge industries. There a need resolve this for us get good that can be used domestic purposes. This article proposes suitable classification model classifying quality based on machine learning algorithms. paper analyzed compared performance various models algorithms in...
Dijkstra's algorithm is a classic for finding the shortest path between two points due to its optimisation capability. The adjacency matrix naive storage structure of algorithm. This has limited use as it expands large space. A multi-layer dictionary proposed in this work enhance structure. Previously, was used optimise single parameter (such distance, time and fuel) movement places. computed using shortest; however, may not be most feasible. needs other factors such energy consumption...
Routing techniques in Mobile Ad hoc Networks (MANETs) rely on asymmetric connections, so data received for one connection is completely useless another. As additional design scenarios and operational complexity are added to the redundancy network, it becomes difficult choose which method should be used when primary link down packet flows switching between multiple paths. Two reactive protocols— Dynamic Source (DSR) Ad-Hoc Demand Distance Vector Protocol (AODV)—will this study compare...
Wireless Body Area Networks (WBANs) have gained attention as a promising technology for healthcare applications. However, one of the key challenges in WBANs is reliability gateway device which serves bridge between WBAN and external network. This research has proposed technique failure problem occurs when default fails to transmit packets medical server due unforeseen circumstances such loss network, power interruption during continuous packet transmission. method called redundant...
Internet of Things (IoT) is currently one the top technological concepts where users and objects are interconnected using wired wireless technologies such as Wireless Sensor Networks (WSNs), ZigBee, NFC, RFID, GPRS, LTE Bluetooth, anywhere anyplace. Within past ten years, idea IoT has drawn massive consideration from both business research communities. Application domains may have many substantial benefits by means an approach. The this field study to portray a basic knowledge smart...
Martial arts (MAs) are considered as a preserved heritage primarily due to the fact that it promotes certain level of identities culture. MA refers art combat and self-defense which normally combines offensive defensive techniques. Technology advancements have made motion capture (MoCap) be widely used in evaluate human performance. Nevertheless, researches on extrinsic feedbacks (EFs) through developed evaluation system scarce. Furthermore, there is no complete framework suggested for MA....
Resource discovery in unstructured peer-to-peer (P2P) networks is important the field of grid computing. Breadth-first search (BFS) widely used for resource P2P networks. The technique proven to return as many results possible. However, network cost high due flooding query messages that can degenerate performance whole network. objective this study optimise BFS technique, so it will produce good without with unnecessary walkers. Several techniques are discussed and categorised. simulators...
The signing process is one of the most important processes used by organizations to ensure confidentiality information and protect it against any unauthorized penetration or access such information. As individuals enter digital world, there an urgent need for a system capable distinguishing between original fraud signature, in order authorization determine powers allowed them. In this paper, three widely feature detection algorithms, HARRIS, BRISK (Binary Robust Invariant Scalable Keypoints)...
Object tracking is an important application in which applicable many areas, included but not limited to the items shopping malls, or instrument factories/industrial areas. The of Radio Frequency Identification (RFID) for object has expanded only also cover human monitoring (e.g. workers monitoring, marathon monitoring) and livestock monitoring. Advantages using RFID compared other wireless technologies applications that multiple objects can be detected simultaneously. aim this paper...
Path planning is the first task for a Robot to autonomously navigate, especially autonomous Robots.For multi-Robot systems process more complex than single system.The commonly known algorithms path usually finds solutions and do not propose ideas systems.In this paper an enhanced Dijkstra's algorithm with multi-layer dictionary used navigate multiple Robots on indoor map simultaneously.Simulation Experimental results show that proposed was able generate paths where navigating through...
This paper explores the development and implementation of an agility monitoring system, aiming to provide real-time assessment athlete's agility. The need for such technology facilitate instant remote has become increasingly apparent in field sports science. Unfortunately, progress this area been relatively slow until emergence IoT (Internet Things) technology, which presents a promising avenue athlete through telemetering. core innovative system consists pad module, with communication...
The act of voting is an inherent and essential entitlement that universally granted to all individuals. Electronic voting, commonly known as e-voting, a method utilises electronic equipment facilitate manage the process casting tallying votes. systems are employed expedite ballots. Furthermore, it will reduce amount money needed pay for counting staff while also reducing human error. implementation remote would greatly benefit individuals residing at considerable distance from their...
With the widespread availability of free AI-powered mobile applications, creation realistic and deceptive videos known as "DeepFakes" has become increasingly effortless. Detecting authenticity such poses a formidable challenge due to scarcity discernible traces. In this study, we delve into application an image processing algorithm, specifically InceptionResNetV2, for deepfake detection in videos. The amalgamation ResNet Inception models InceptionResNetV2 yields superior accuracy, making it...
Running is a common and easily accessible physical activity that greatly enhances mental cardiovascular health. The development of technology has completely changed the way we think about fitness. However, absence sophisticated intelligent running tracking system poses several problems. Among problems enthusiasts face recording data analysing runner for coaches to monitor their health in field paces, heart rate, distances using wearable devices. In monitoring, incautious condition while...
Martial art (MA) is considered a conserved heritage primarily for promoting certain level of identities and cultures. With the technology advancement, motion capture has been widely used in MA to evaluate human performance. However, methods create templates (templates) techniques from scratch are rarely exposed because there no complete evaluation system framework suggested MA. This paper presents detaile how using extrinsic feedback-based generally R-GDL specifically. To more robust...
Real-time state of health the livestock allows early diseases detection and interventions that will help avoid losses due to contagious diseases. This paper aims describe design deployment a long-range multiple-input Radio Frequency Identification (RFID) monitoring system efficiently monitor real-time goat feeding resting behaviour in dairy farm by periodically collect strength radio signal. The integrated comprises passive RFID tag attached animal ear communicates with UHF-based 4-port...
Martial art (MA) is considered a conserved heritage primarily for promoting certain level of identities and cultures. With the technology advancement, motion capture has been widely used in MA to evaluate human performance. However, methods create templates (templates) techniques from scratch are rarely exposed because there no complete evaluation system framework suggested MA. This paper presents detaile how using extrinsic feedback-based generally R-GDL specifically. To more robust...
Internet of Things technology has become one the most advanced technologies that will change and many traditional things add advantages to systems environment improve level services provided users, whether in field smart health care or homes energy etc.In this paper, we introduce concept Things, its applications components for a broader understanding (I oT) try enable support develop efficiency other functions. And importance integrating with artificial intelligence machine learning assist...
Folk dance (FD) is a type of traditional that has been handed down through culture or group from generation to generation. It crucial preserve and safeguard this cultural legacy since it can reflect the history identity particular nations. However, due ineffective preservation conservation techniques, survival FDs being negatively impacted more more. Its extinction may be caused by ignorance about disregard for efforts. The most efficient method digitizing intangible property, including FDs,...