Search Results - (( rice processing problems algorithm ) OR ( java application modified algorithm ))

  • Showing 1 - 7 results of 7
Refine Results
  1. 1
  2. 2

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…A GUI is created in a form of JAVA application to display data detected from tag. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…The algorithm is implemented as a plugin. It does not interfere with the web application original code. …”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    Aerial imagery paddy seedlings inspection using deep learning by Anuar, Mohamed Marzhar, Abdul Halin, Alfian, Perumal, Thinagaran, Kalantar, Bahareh

    Published 2022
    “…Deep learning algorithms in computer vision for image classification and object detection can facilitate the agriculture industry, especially in paddy cultivation, to alleviate human efforts in laborious, burdensome, and repetitive tasks. …”
    Get full text
    Get full text
    Article
  7. 7

    Design of intelligent control system and its application on fabricated conveyor belt grain dryer by Lutfy, Omar F.

    Published 2011
    “…This controller has several advantages over its conventional ANFIS counterpart, particularly the reduction in processing time. Moreover, three evolutionary algorithms (EAs), in particular a real-coded genetic algorithm (GA), a particle swarm optimization (PSO), and a global-best harmony search (GHS), were separately used to train the proposed controller and to determine its scaling factors. …”
    Get full text
    Get full text
    Thesis