Search Results - (( development conflicts detection algorithm ) OR ( java application optimisation algorithm ))

  • Showing 1 - 13 results of 13
Refine Results
  1. 1

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Collision avoidance algorithm design for UAV base on parametric theorem and circle overlapping method / Nur Fadzilah Mohamad Radzi by Nur Fadzilah, Mohamad Radzi

    Published 2013
    “…Finally, the collision avoidance algorithm is verified through MATLAB software. Various cases are tested to demonstrate the robustness of both collision detection and avoidance algorithms.…”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Graph-based conflict rectification using stroke gesture approach in timetabling system (CORECTS) by Yong, Tien Fui, Choo, Wou Onn, Chue, Wen Yeen, Kok, Hui Meian

    Published 2010
    “…CORECTS will apply a hybrid method using annealing graph algorithm and the proposed STAR-quadrants to display the conflict detection of the entire timetable.Simple stroke gesture is used to expedite the conflict resolution process. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Straight projection conflict detection and cooperative avoidance for autonomous unmanned aircraft systems by Albaker, B.M., Rahim, N.A.

    Published 2009
    “…The collision avoidance system will allow each aircraft to negotiate with each another to determine a safe and acceptable solution when potential conflict is detected. The proposed approach uses cooperative, peer to peer negotiation technique in order to efficiently resolve air traffic conflicts.…”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Autonomous Wildlife Deterrent System (AWDS) / Muhammad Afiq Muhammad Nazri ... [et al.] by Muhammad Nazri, Muhammad Afiq, Mohd Hazuhaini, Haekal Erfan, Shaifful Azzwan, Aina Shafiza, Abd Hafidz, Amylea Nadzirah

    Published 2024
    “…By leveraging advanced detection sensors, artificial intelligence (AI) algorithms, and automated deterrents, the AWDS aims to proactively prevent wildlife from encroaching into human-inhabited areas. …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Web-based expert system for material selection of natural fiber- reinforced polymer composites by Ahmed Ali, Basheer Ahmed

    Published 2015
    “…Finally, the developed expert system was deployed over the internet with central interactive interface from the server as a web-based application. As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
    Get full text
    Get full text
    Thesis
  8. 8

    Test case generation from state machine with OCL constraints using search-based techniques / Aneesa Ali Ali Saeed by Aneesa Ali, Ali Saeed

    Published 2017
    “…One contribution of this thesis is developing an efficient technique for detecting automatically infeasible paths that contain transitions with conflicted OCL constraints. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Smart student timetable planner by Wong, Xin Tong

    Published 2025
    “…The project scope encompasses features such as secure login, course selection with conflict detection, timetable history, comparison between auto-generated and manual schedules, collaboration modules, and export functionality. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  11. 11

    Development Of A Robust Blind Digital Video Watermarking Algorithm Using Discrete Wavelet Transform by Al-Deen, Ahmed A. Baha'a

    Published 2007
    “…On the other hand, a random key is used to choose the frames to be watermarked to increase the security level of the algorithm and discourage piracy. The aim of this research is to develop a video watermarking algorithm to embed a binary image inside the uncoded video stream that acts as a logo. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Student resource exchange: a web-based system for sharing educational resources among students by Saw, Hui Loo

    Published 2025
    “…In addition, the platform introduces AI-powered study tools, including automated question generation and flashcards, as well as a built-in smart calendar planner that applies conflict detection and priority-based scheduling algorithms to help students manage study sessions and deadlines effectively. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  13. 13

    Collective interaction filtering with graph-based descriptors for crowd behaviour analysis by Wong, Pei Voon

    Published 2018
    “…The group detection experiment is implemented using the clustering algorithm. …”
    Get full text
    Get full text
    Thesis