Search Results - (( programming ability detection algorithm ) OR ( java application optimisation algorithm ))
Search alternatives:
- application optimisation »
- optimisation algorithm »
- ability detection »
- java application »
-
1
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
Get full text
Get full text
Get full text
Article -
2
Road lane detection using h-maxima and improved hough transform
Published 2012“…A fast and improved algorithm with the ability to detect unexpected lane changes is aimed in this paper. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
-
4
Web-based expert system for material selection of natural fiber- reinforced polymer composites
Published 2015“…Finally, the developed expert system was deployed over the internet with central interactive interface from the server as a web-based application. As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
Get full text
Get full text
Thesis -
5
Obstacles Avoidance Mobile Robot
Published 2007“…The obstacle avoidance algorithm is very useful in order to provide a program or a mobile robot with the ability to move independently while avoiding itself to collide with any kind of obstacles such as a surveillance robot. …”
Get full text
Get full text
Final Year Project -
6
-
7
Cyclic redundancy encoder for error detection in communication channels
Published 2004“…This paper describes the methodology used and the implementation of the Cyclic Redundancy Check (CRC) algorithm using Ci+ programming. The technique gained its popularity because it combines three advantages: Extreme error detection capabilities, little overhead and ease of implementation. …”
Get full text
Get full text
Get full text
Proceeding Paper -
8
Effects of Authentication of Users in Mobile Internet Protocol Version 6
Published 2004“…Presently, mobility is difficult, if not impossible to detect at the application layer though easily detectable at the network layer. …”
Get full text
Get full text
Thesis -
9
Can recognition using LABVIEW / Jamilah Othman
Published 2008Get full text
Get full text
Student Project -
10
Potential issues in novel computational research: artificial immune systems
Published 2003“…Recent trends in computational research show the significance of computation-based biological research, for example, bioinformatics and system biology, and biologically inspired computational research, which includes genetic algorithms, artificial neural networks, and evolutionary programming. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
-
12
-
13
Empirical study on intelligent android malware detection based on supervised machine learning
Published 2020“…In response, specific tools and anti-virus programs used conventional signature-based methods in order to detect such Android malware applications. …”
Get full text
Get full text
Get full text
Get full text
Article -
14
Speed-up robust features based 3D object recognition for grasping by three fingered robot hand / Nurul Hanani Remeli
Published 2018“…The ability to manipulate objects is one of the important requirements for industrial robots. …”
Get full text
Get full text
Thesis -
15
-
16
Corrigendum to “Integrated miniature fluorescent probe to leverage the sensing potential of ZnO quantum dots for the detection of copper (II) ions”
Published 2014“…The probe was operated using a microcontroller (Arduino Uno Revision 3) that has been programmed with the analytical response and the working algorithm of the electronics. …”
Get full text
Get full text
Get full text
Article -
17
Prediction of novel doping agent using an in silico model that integrates chemical, biological and phenotypic data
Published 2016“…High performance Liquid Chromatography (HPLC) to detect novel doping agents usually involves a time consuming process. …”
Get full text
Get full text
Student Project -
18
-
19
Sensor based line follower self-driving car (sCar) with Obstacles Avoidance
Published 2016“…We develop a Collision Avoidance path-planning Algorithm (CAA) for dual motors controller line follower sCar that has ability for navigate collision avoidance path autonomously through a constraint track from initial position to goal position. …”
Get full text
Get full text
Get full text
Article -
20
Solving power system state estimation using orthogonal decomposition algorithm / Tey Siew Kian
Published 2009“…This optimal state estimate and corrected data base are then used by the security monitoring and operation and control functions of the center.Most state estimation programs in practical use are formulated as overdetermined systems (Pozrikidis, 2008) of nonlinear equations and solved as weighted least square problems (refer to section 2.1.1).This research involves finding the least squares solution of the power system state estimation problem, HTR-1HDx = HTR-1 [z - f (x)] (refer to section 2.3.1) and to develop a program to implement the said algorithm. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis
