Search Results - (( (frames OR frame) constructing a algorithm ) OR ( java application using algorithm ))

Refine Results
  1. 1

    802.11 MAC layer sniffer using spoof detection algorithm / Azwan Abdul Satar by Abdul Satar, Azwan

    Published 2007
    “…The result of these tests showed that the wireless sniffer was able to identify all normal gap, spoofing, high gap between successive frames, out of order and retransmit frames. Furthermore, at the end of its execution, the sniffer provide simple network statistic allowing user to detect abnormal fraffic such as high gap between successive frames sequence number or high percentage of retransmitted frames send by a source. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Development of obstable avoidance system for 3D robot navigation by Er, Kai Sheng

    Published 2024
    “…To prepare for obstacle avoidance algorithm development, a differential drive robot was constructed, and a URDF description was prepared to ensure correct odometry data conversion from sensor coordinate frames to the robot coordinate frame. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  4. 4

    Development of finite element model for soil-structure interaction by Shoaei, Mohammad Dalili

    Published 2014
    “…Nonlinear interactive analysis of an asymmetric frame in the current study showed 26% increase in the required volume of reinforced concrete for construction of the frame. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    A fuzzy approach for early human action detection / Ekta Vats by Ekta, Vats

    Published 2016
    “…The novelty lies in the construction of a frame-by-frame membership function for each kind of possible movement, taking into account several human actions from a publicly available dataset. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Analytical model for partially prestressed concrete beam-column elements by Esfahani, Milad Hafezolghorani

    Published 2017
    “…For this purpose, constitutive law and mathematical model for the three dimensional PPC beam-column element are formulated and a special finite element algorithm is developed. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Development of a scalable video compression algorithm by Khalifa, Othman Omran, Issa, Sinzobakwira, Olanweraju, Rashidah Funke, Al Khazmi, El Mahdi A

    Published 2012
    “…To improve the perceptual quality of coded video in a computation-constrained scenario, through controlling per-frame complexity, a rate-distortion optimised (RDO) rate control algorithm for encoding low bit rate video helped to achieve the target bitrates and PSNR using Lagrangian multiplier function. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  10. 10

    Block Matching Algorithm (BMA) of the Hybrid Adaptive Rood Pattern Search (ARPS) Based on Its Motion Speed by Faizul Hadi Jamil, Ali Chekima, Wong Hock Tze @ Farrah Wong, Rosalyn R Porle, Razak Ali Lee, Ismail Saad

    Published 2017
    “…The experimental result shows that by using the hybrid BMA technique, it can produce a better quality of the constructed frame and also it achieve less computational complexity at the same time.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    Building a feature-space for visual surveillance by Altahir, A.A., Asirvadam, V.S.

    Published 2014
    “…The future of visual surveillance applications relies on the developments in the area of computer vision, human motion analysis and computer algorithms. This paper considers objects low level feature selection and extraction from video frames in order to construct a feature space for visual surveillance applications. …”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Two-dimensional burst construction with QoS assurance for OFDMA mobile WiMAX system by Alsahag, Ali Mohammed Mansoor, Mohd Ali, Borhanuddin, Noordin, Nor Kamariah, Mohamad, Hafizal, Ramli, Nordin

    Published 2014
    “…For multiuser environments, IEEE 802.16 OFDMA systems require a resource allocation algorithm to use the limited downlink resource efficiently. …”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14
  15. 15

    Real-time shadow casting using fake soft shadow volume with stencil buffer by Lee, Kong Weng

    Published 2006
    “…Results from various tests reveal that the proposed algorithm not only achieves better frame per second performance but also maintains the quality of soft shadows. …”
    Get full text
    Get full text
    Thesis
  16. 16

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  17. 17
  18. 18
  19. 19
  20. 20

    Design and development of single-axis solar tracking system and water level control for application of line focus concentrator for solar desalination process by Muhammad Adam, Zahari

    Published 2017
    “…This project discusses the design and construction of a prototype for solar tracking system that has a single axis of freedom. …”
    Get full text
    Get full text
    Undergraduates Project Papers