Search Results - (( programming step detection algorithm ) OR ( java application optimisation algorithm ))
Search alternatives:
- application optimisation »
- optimisation algorithm »
- programming step »
- java application »
- step detection »
-
1
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
Get full text
Get full text
Get full text
Article -
2
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
3
-
4
Early detection and mitigation of DDoS attacks in software defined networks
Published 2018“…The algorithm was written in Python programming language to be implementing on a POX controller. …”
Get full text
Get full text
Thesis -
5
Forward-Backward Time Stepping with Automated Edge-preserving Regularization Technique for Wood Defects Detection
Published 2019“…Therefore, the microwave imaging technique is proposed to detect the wood defects. In this thesis, Forward-Backward Time-Stepping (FBTS) method is applied to microwave imaging wood defect detection application. …”
Get full text
Get full text
Thesis -
6
Face detection in image sequence / Noor Diana Abdullah
Published 2007Get full text
Get full text
Thesis -
7
-
8
Web-based expert system for material selection of natural fiber- reinforced polymer composites
Published 2015“…Finally, the developed expert system was deployed over the internet with central interactive interface from the server as a web-based application. As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
Get full text
Get full text
Thesis -
9
-
10
-
11
-
12
Compression of Three-Dimensional Terrain Data Using Lifting Scheme Based on Second Generation Wavelets
Published 2006“…The newly developed algorithm was applied to compress Light Detection and Ranging (LIDAR) data to check the efficiency of the program. …”
Get full text
Get full text
Thesis -
13
Heartbeat disease diagnosis using text-based approaches
Published 2011Get full text
Get full text
Thesis -
14
Car detection using cascade classifier on embedded platform
Published 2020“…One of the features of ADAS is Forward Collision Warning System (FCWS). In FCWS, car detection is a crucial step. This paper explains about car detection system using cascade classifier running on embedded platform. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
15
Development of elasto-plastic viscous damper finite element model for reinforced concrete frames
Published 2014“…The finite element model consists of reinforced concrete frame element and viscous damper element is developed and special finite element algorithm using Newmark׳s direct step-by-step integration is developed for inelastic dynamic analysis of structure with supplementary elasto-plastic viscous damper element. …”
Get full text
Get full text
Article -
16
Nearfield Electromagnetic Imaging Technique For Brain Tumour Detection
Published 2019“…The simulation consists of two main techniques; a FDTD technique for computational electromagnetics, and Forward-Backward Time-Stepping (FBTS) technique, an algorithm to solve inverse problems. …”
Get full text
Get full text
Get full text
Thesis -
17
-
18
Exploring frogeye leaf spot disease severity in soybean through hyperspectral data analysis and machine learning with Orange Data Mining
Published 2025“…No previous study has investigated Orange mining tool as visual programming approach in analysing hyperspectral reflectance data, especially in crop disease detection. …”
Get full text
Get full text
Get full text
Article -
19
Database encryption for a Web-based Claims System
Published 2008“…On the other hand, the analysis of encryption algorithms with Web browsers, the results have shown that Twofish algorithm is best suited to the system that has been developed using ASP Web programming language on Internet Explorer. …”
Get full text
Thesis -
20
Speed-up robust features based 3D object recognition for grasping by three fingered robot hand / Nurul Hanani Remeli
Published 2018“…The result proved that the capability of the SURF algorithm to be better in recognising 100% of the target object without fail for nine random images but it has produced accumulated error throughout the steps in getting the 3D position. …”
Get full text
Get full text
Thesis
