Search Results - (( iris implementation level algorithm ) OR ( java application optimisation algorithm ))
Search alternatives:
- application optimisation »
- optimisation algorithm »
- implementation level »
- iris implementation »
- java application »
- level algorithm »
-
1
Development of Real-Time Eye Tracking Algorithm
Published 2021“…This project develops a real-time eye tracking algorithm to improve the accuracy of iris detection and gaze classification. …”
Get full text
Get full text
Conference or Workshop Item -
2
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
Get full text
Get full text
Get full text
Article -
3
Detection of corneal arcus using rubber sheet and machine learning methods
Published 2019“…The benchmark of the classification algorithm for CA is needed to analyze the optimal output of the algorithm. …”
Get full text
Get full text
Thesis -
4
Web-based expert system for material selection of natural fiber- reinforced polymer composites
Published 2015“…Finally, the developed expert system was deployed over the internet with central interactive interface from the server as a web-based application. As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
Get full text
Get full text
Thesis -
5
Smart biosecurity door locking system / Nur Nadia Syahirah ‘Asri
Published 2017“…There are four phases involved which are inception, elaboration, construction and lastly, transition. As expected, the algorithm applied in this project is effective and can help users to increase their home security level. …”
Get full text
Get full text
Thesis -
6
Security system using biometric technology: Design and implementation of voice recognition system (VRS)
Published 2008“…In this paper, we present an implementation of a security system based on voice identification as the access control key. …”
Get full text
Get full text
Get full text
Conference or Workshop Item
