Search Results - (( (frames OR frame) constructing based algorithm ) OR ( java application using algorithm ))

Refine Results
  1. 1

    802.11 MAC layer sniffer using spoof detection algorithm / Azwan Abdul Satar by Abdul Satar, Azwan

    Published 2007
    “…The wireless sniffer implements sequence number-based spoofing detection algorithm in its processing. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3
  4. 4

    A fuzzy approach for early human action detection / Ekta Vats by Ekta, Vats

    Published 2016
    “…It combines the benefits of computer vision and fuzzy set theory based on fuzzy BK subproduct. The novelty lies in the construction of a frame-by-frame membership function for each kind of possible movement, taking into account several human actions from a publicly available dataset. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Semantic shot classification in soccer videos via playfield ratio and object size considerations. by Abdul Halin, Alfian, Mohd Sharef, Nurfadhlina, Jantan, Azrul Hazri

    Published 2013
    “…Class labels are then accordingly assigned to each frame based on carefully constructed rule-sets. Majority voting is finally performed where the dominant frame labels within each shot is used as the ultimate class label. …”
    Get full text
    Get full text
    Article
  6. 6

    Analytical model for partially prestressed concrete beam-column elements by Esfahani, Milad Hafezolghorani

    Published 2017
    “…Besides, based on an extensive review of the literature, there is less information available about the possibility of identifying the damage in partially prestressed concrete beams and frame structures during earthquake excitation. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Development of a scalable video compression algorithm by Khalifa, Othman Omran, Issa, Sinzobakwira, Olanweraju, Rashidah Funke, Al Khazmi, El Mahdi A

    Published 2012
    “…The result shows that the managed complexity algorithm based on Lagrangian Multiplier function outperforms the normal encoder. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  8. 8
  9. 9

    Building a feature-space for visual surveillance by Altahir, A.A., Asirvadam, V.S.

    Published 2014
    “…The future of visual surveillance applications relies on the developments in the area of computer vision, human motion analysis and computer algorithms. This paper considers objects low level feature selection and extraction from video frames in order to construct a feature space for visual surveillance applications. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10
  11. 11
  12. 12

    Design and development of single-axis solar tracking system and water level control for application of line focus concentrator for solar desalination process by Muhammad Adam, Zahari

    Published 2017
    “…The control circuit is based on an ATMega328P microcontroller. It was programmed to detect sunlight via the LDRs before actuating the motor to position the parabolic frame. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  13. 13

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  14. 14
  15. 15
  16. 16
  17. 17

    Savitzky-Golay Filter-Based PLL: Modeling and Performance Validation by Hasan, K., Meraj, S.T., Othman, M.M., Lipu, M.S.H., Hannan, M.A., Muttaqi, K.M.

    Published 2022
    “…A phase-locked loop (PLL) based on synchronous reference frame (SRF) is a standard PLL that has a simple construction and performs well under undisrupted grid conditions. …”
    Get full text
    Get full text
    Article
  18. 18

    The impact of executive function and aerobic exercise recognition in obese children under deep learning by JING, XIN, ABDULLAH, BORHANNUDIN, ABU SAAD, HAZIZI, YANG, XIANGKUN

    Published 2025
    “…Initially, a motion recognition model based on STN and Lucas–Kanade optical flow algorithm optimization was constructed. …”
    Get full text
    Get full text
    Article
  19. 19

    Performance enhancement of adaptive cluster formation and routing protocols in wireless networks by Khalaf, Osamah Ibrahem

    Published 2017
    “…Layer description coding (LDC), which divides the video frames into the base layer (BL) and enhanced layer (EL), is used to encode and decode the original video. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Real-Time Video Processing Using Native Programming on Android Platform by Saipullah, Khairul Muzzammil

    Published 2012
    “…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item