Search Results - (( java application optimisation algorithm ) OR ( after implementation cell algorithm ))

  • Showing 1 - 9 results of 9
Refine Results
  1. 1

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Synthesis of transistor chaining algorithm for CMOS cell layout using euler path / Sukri Hanafiah by Hanafiah, Sukri

    Published 1997
    “…The euler's path it using pseudo input and Heuristic algorithm to find the minimum interlace. The comparison between euler's path and Bipartite graph Algorithm [14] will be made at the end this of this report to see which one give optimal chaining .…”
    Get full text
    Get full text
    Thesis
  3. 3

    New Contrast Enhancement Technique For Non-Uniform Illumination Digital Colour Medical Images by Eng , Sheh Ling

    Published 2016
    “…After obtaining more even illumination cell images, this proposed algorithm addresses the low contrast problem by proposing new non-linear dark region bright region contrast enhancement techniques to enhance dark and bright regions individually. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Web-based expert system for material selection of natural fiber- reinforced polymer composites by Ahmed Ali, Basheer Ahmed

    Published 2015
    “…Finally, the developed expert system was deployed over the internet with central interactive interface from the server as a web-based application. As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
    Get full text
    Get full text
    Thesis
  5. 5

    Rtl Implementation Of Secure Hash Algorithm 3 (Sha-3) Towards Smaller Area by Lim , Yen Ruen

    Published 2017
    “…Among all of the cryptography measures, Secure Hash Algorithm 3 (SHA-3) is the newest and secure cryptographic hash algorithm in the current electronic industry. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Token based path allocation approach for mobile robots in sorting centre for achieving high throughput by Khoo, Zong Zheng

    Published 2024
    “…This project proposes an improved path-finding algorithm that implements token-based path finding while a robot wants to access a grid cell. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  8. 8

    Classification of Parkinson's Disease (PD) Based on Multilayer Perception (MLPs) Neural Network and Anova as a feature extraction / Zahari Abu Bakar ... [et al.] by Abu Bakar, Zahari, Ibrahim, Nur Farahiah, Ispawi, Dzufi Iszura, Md. Tahir, Nooritawati

    Published 2012
    “…Results attained confirmed that the LM performed well with accuracy rate of above 90% before and after feature selection whilst SSG attained above 85% subsequent to implementation of ANOVA as feature selection.…”
    Get full text
    Get full text
    Thesis
  9. 9

    Classification of parkinson's disease (pd) based on multilayer perceptrons (MLPs) neural network and anova as a feature extraction / Zahari Abu Bakar ... [et al.] by Abu Bakar, Zahari, Ibrahim, Nur Farahiah, Ispawi, Dzufi Iszura, Md. Tahir, Nooritawati

    Published 2012
    “…Results attained confirmed that the LM performed well with accuracy rate of above 90% before and after feature selection whilst SSG attained above 85% subsequent to implementation of ANOVA as feature selection.…”
    Get full text
    Get full text
    Thesis