Search Results - (( development projects normalization algorithm ) OR ( java applications optimisation algorithm ))
Search alternatives:
- applications optimisation »
- normalization algorithm »
- projects normalization »
- optimisation algorithm »
- development projects »
- java applications »
-
1
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
Get full text
Get full text
Get full text
Article -
2
DEVELOPMENT OF IRIS RECOGNITION SYSTEM
Published 2016“…The “objective of this” project “is to develop” a secure “iris recognition” algorithm for identification management and access control. …”
Get full text
Get full text
Final Year Project -
3
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…In order to make the normal people can cluster their data easily, this project aims is to develop a web-based clustering tool that can be used by all peoples. …”
Get full text
Get full text
Thesis -
4
Web-based expert system for material selection of natural fiber- reinforced polymer composites
Published 2015“…Finally, the developed expert system was deployed over the internet with central interactive interface from the server as a web-based application. As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
Get full text
Get full text
Thesis -
5
AUTONOMOUS POWER LINE INSPECTION USING COMPUTER VISION
Published 2022“…The developed algorithm is trained on the augmented Chinese Power Line Insulator Dataset (CPLID) that consisted of normal and missing cap insulator images. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
6
Algorithm for calculation of cephalometric soft tissue facial traits
Published 2007“…This paper presents development of a new soft tissue analysis algorithm, which will be used as an analysis tool in Computer Assisted Craniofacial Surgery Planner – a surgery planning system under development. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
-
8
Stroke-to-stroke matching in on-line signature verification
Published 2010“…This project suggesting a modified DTW algorithm with the proposed Missed Nodes Recovery Algorithm aims to improve the mapping performance, hence the development of stroke to stroke signature comparison is possible. …”
Get full text
Get full text
Thesis -
9
Modelling of multi-robot system for search and rescue
Published 2023“…In this project, this sensor-based algorithm is known as the Obstacle Avoidance Algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
10
A FUZZY LOGIC ALGORITHM FOR HEART RATE MONITORING
Published 2014Get full text
Get full text
Final Year Project -
11
-
12
-
13
Application of Evolutionary Algorithm for Assisted History Matching
Published 2014“…Today, tremendous efforts are made to develop Automatic History Matching algorithms. While the automatic method focus on optimization which is normally computer based. …”
Get full text
Get full text
Final Year Project -
14
Iris Recognition As Biometric Authentication
Published 2016“…In this project, the proposed iris recognition technique will be based on the John Daugman’s algorithm. …”
Get full text
Get full text
Final Year Project -
15
Development of Technical Safety Dashboard Using Microsoft Power BI Integration with R
Published 2020“…As to perform these studies, literature review has been executed together with the prototype development. In this paper, all researches and results of this project development completely documented.…”
Get full text
Get full text
Final Year Project -
16
Application Of Neural Network In Malaria Parasites Classification
Published 2006“…The first stage of this project is to develop the neural network using MATLAB Neural Network Toolbox and Borland C++ Builder. …”
Get full text
Get full text
Monograph -
17
Design and development of elective courses recommender system (ECORS)
Published 2017“…A rule-based algorithm is chosen to use in this project. It combines normalized scores representing variables such as interest score including a student's personal interests. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
18
Smart object detection using deep learning algorithm and jetson nano for blind people
Published 2021“…Therefore, this project develops a smart object detection using deep learning algorithm and jetson nano to improve object detection for blind people. …”
Get full text
Get full text
Conference or Workshop Item -
19
Parallel distributed genetic algorithm development based on microcontrollers framework
Published 2023Conference paper -
20
Intelligent DNA signature detection for internet worms
Published 2011“…Active worms spread in an automated fashion flooding the Internet in a very short time.Slammer worm infected more than 90% of vulnerable machines within 10 minutes on January 25th, 2003.Hence it is necessary to monitor and detect the worms as soon as they are introduced to minimize the damage caused by them.This project concentrates on developing an anti-scanning worm detection system that can automatically detect and control the spread of internet scanning worms without any manual intervention.The Intelligent Failure Connection Algorithm (IFCA) developed in this project can detect both stealth and normal worms within a short time.Experiments conducted as part of the evaluation shows that IFCA detects a worm within two scanning cycles of the worm.This is faster than any of the currently available algorithms or mechanisms reported in the literature.The IFCA uses Artificial Immune System (AIS) for the purpose of monitoring and detecting the worms.The Traffic Signature Algorithm (TSA) developed in the project captures the traffic signature of the worm from the infector when it sends the traffic to the victim.The Intelligent DNA Signature Detection Algorithm (IDNASDA) algorithm works by breaking an infection session into different infection phases, each phase containing a number of different traffic such as Internet Control Message Protocol (ICMP), Transmission Control Protocol (TCP), or User Datagram Protocol (UDP).Finally it converts the traffic signature to DNA signature.The tests carried out show that the IDNASD could detect DNA signature for MSBlaster worm.…”
Get full text
Get full text
Get full text
Get full text
Monograph
