Search Results - (( course detection method algorithm ) OR ( java application customization algorithm ))
Search alternatives:
- customization algorithm »
- course detection »
- method algorithm »
- java application »
-
1
Fingerprint recognition using neural networks / Kennie Yeoh Eng Hoe
Published 2001“…Traditional methods of fingerprint verification uses either complicated feature detection algorithms that are not specific to each fingerprint, or compare two fingerprint images directly using image processing toots. …”
Get full text
Get full text
Thesis -
2
Modified perturb & observe maximum power point technique for solar photovoltaic systems
Published 2023“…By varying the step size of the perturbation in the traditional P&O algorithm, it can able to detect the maximum power point (MPP) in any situation, and it can be implemented with less cost while compared to the conventional models. …”
Article -
3
Lane detection system for autonomous vehicle using image processing techniques
Published 2005“…A Radon peak detection algorithm was developed based on two values, Rand O. …”
Get full text
Get full text
Thesis -
4
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
5
An Efficient IDS Using Hybrid Magnetic Swarm Optimization in WANETs
Published 2018“…In order to improve the effectiveness of intrusion detection systems (IDSs), data analysis methods such as data mining and classification methods are often integrated with IDSs. …”
Get full text
Get full text
Article -
6
An efficient IDS using hybrid Magnetic swarm optimization in WANETs
Published 2018“…In order to improve the effectiveness of intrusion detection systems (IDSs), data analysis methods such as data mining and classification methods are often integrated with IDSs. …”
Get full text
Get full text
Get full text
Get full text
Article -
7
Enabling live video technology for distance learning using IP based camera / Nor Syuhaila Sobri
Published 2007“…This elicitation is used the scenario-based technique to identify the requirement. We also proposed algorithm of bandwidth detection in order to detect the bandwidth of a current network. …”
Get full text
Get full text
Thesis -
8
DurianCare: optimising trunk disease detection and precision farming in a mobile application / Muhammad Haziq Azmi
Published 2025“…In this project we do propose a construction of “DurianCare”, a mobile application that able to utilize techniques of Convolutional Neural Networks (CNN), Precision Agriculture, and Content Based Filtering for enhancing the farming practices of sustaining crops by advanced disease detection and the guided recommendation. The project will implement automated detection and disease management recommendation algorithms while evaluating the functionality and usability of the designed application. …”
Get full text
Get full text
Thesis -
9
Smart student timetable planner
Published 2025“…The objectives of this project are to generate conflict-free and customizable schedules, enable real-time collaboration among students, and offer administrative tools for maintaining course information. The project scope encompasses features such as secure login, course selection with conflict detection, timetable history, comparison between auto-generated and manual schedules, collaboration modules, and export functionality. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
10
Haemoglobin distribution in ulcers for healing assessment
Published 2012“…Extracted haemoglobin images indicate areas of haemoglobin distribution reflecting detected regions of granulation tissue. Data clustering techniques are implemented to classify and segment detected regions of granulation tissue from the extracted haemoglobin images. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item
