Search Results - (( processes specification drops algorithm ) OR ( java application optimisation algorithm ))
Search alternatives:
- application optimisation »
- processes specification »
- optimisation algorithm »
- java application »
- drops »
-
1
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
Get full text
Get full text
Get full text
Article -
2
ACCURACY ENHANCEMENT OF OMR FOR EXAM MARKING WITHOUT PRE-SET TEMPLATE USING IMAGE PROCESSING
Published 2019“…OMR marking machine is costly and limited to specific OMR paper design, thus launching researches using image processing to find less costly solutions. …”
Get full text
Get full text
Final Year Project -
3
-
4
Web-based expert system for material selection of natural fiber- reinforced polymer composites
Published 2015“…Finally, the developed expert system was deployed over the internet with central interactive interface from the server as a web-based application. As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
Get full text
Get full text
Thesis -
5
-
6
Design and Development of Artificial Intelligence (Al)-Based Desicion Support System For Manufacturing Applications
Published 2016“…In the image processing stage, a flaw map, as described in the previous report, is used. …”
Get full text
Monograph -
7
An Efficient Energy Aware Adaptive System-On-Chip Architecture For Real-Time Video Analytics
Published 2016“…Delivering real-time performance for the fast-growing video resolutions while maintaining the architecture flexibility is non-viable on processors, Graphic Processing Unit, Digital Signal Processor, and Application Specific Integrated Circuit. …”
Get full text
Get full text
Thesis -
8
-
9
Machine Learning Based Two Phase Detection and Mitigation Authentication Scheme for Denial-of-Service Attacks in Software Defined Networks
Published 2024“…This scheme incorporates machine learning techniques by utilizing Support Vector Machine (SVM) and K-Nearest Neighbors (KNN) classification algorithms to accurately identify and handle malicious network traffic following the initial packet filtration process that identifies abnormal traffic. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
A new superimposed topology for single phase wireless power transfer / Azman Ab Malik
Published 2018“…Wireless Power Transfer (WPT) is a process of transferring electrical energy without using any physical wire or cable. …”
Get full text
Get full text
Thesis -
11
A new superimposed topology for single phase wireless power transfer / Azman Ab Malik
Published 2018“…Wireless Power Transfer (WPT) is a process of transferring electrical energy without using any physical wire or cable. …”
Get full text
Get full text
Book Section
