Search Results - (( construct visualization means algorithm ) OR ( java data compression algorithm ))

  • Showing 1 - 15 results of 15
Refine Results
  1. 1

    Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework by Asaad Aref, Ibrahim

    Published 2004
    “…A design proposal was outlined to provide an adaptive client/server approach to stream audio contents using Real-Time Transport Protocol (RTP) involving architecture based on the Java Media Framework (JMF) Application Programmable Interfaces (API).RTP protocol is the Internet-standard protocol for the transport of real-time data, including audio and video and can be implemented by using Java Media Framework (JMF). …”
    Get full text
    Get full text
    Thesis
  2. 2

    Data Hiding Techniques In Digital Images by Al Thloothi, Salah Ramadan

    Published 2003
    “…After all these studies, one of the algorithms in the masking technique is developed and implemented using JAVA program to embed message into true color image with a good quality and higher capacity. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Sentiment Analysis of Sexual Harassment in Malaysia on Twitter Using Machine Learning Algorithms by Nurellezia, Suleiman

    Published 2023
    “…Lastly, the data are visualized using graphs and charts and an overall visualization dashboard is generated for data reporting which helps to analyze and extract meaning behind the sentiments by relating the visualizations with real-life events from legitimate sources such as news and articles. …”
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  5. 5

    SecPath: Energy efficient path reconstruction in wireless sensor network using iterative smoothing by Abd, Wamidh Jwdat

    Published 2019
    “…To achieve energy efficiency, it compresses the packet information by using GZIP tools in JAVA. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Energy efficient path reconstruction in wireless sensor network using iPath by Hasan, Sazlinah, Abd, Wamidh Jwdat, Ariffin, Ahmad Alauddin

    Published 2019
    “…To achieve energy efficiency, it compresses the packet information by using GZIP tools in JAVA. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7
  8. 8

    Blogs Search Engine Adopting RSS Syndication Using Fuzzy Logic by Mohammed, Athraa Jasim

    Published 2012
    “…The blogs search engine consists of three main phases which are crawling using RSS feeds algorithm, indexing weblogs algorithm and searching technique with Fuzzy logic. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Near infrared palm image acquisition and two-finger valley point-based image extraction for palm vascular pattern detection by Mohd Noh, Zarina

    Published 2019
    “…In summary, vascular pattern can be detected visually from the palm image acquired by the NIR palm image acquisition device developed in this research.…”
    Get full text
    Get full text
    Thesis
  11. 11

    Using the line array representation as an alternative method for understanding whole number multiplication among primary students by Chai, Chin Pheng

    Published 2015
    “…Overall, the resulting measures have shown to have good reliability as indicated by a Cronbach's alpha value of 0.79 for Year 3 and 0.82 for Year 5. The higher mean person estimates (Year 3 = +0.27 logits and Year 5 = +0.98 logits) compared with the mean item threshold defaulted at 0.00 logit showed that items were likely well matched for Year 3 students and easy for Year 5 students. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Development and characterization of anonymous nuclear markers to determine genetic variation in two groupers species and their hybrids by Ahmad Zaidi Tani

    Published 2015
    “…An unweighted pair-group method with arithmetic mean (UPGMA) phenogram was constructed based on the GD and CCC values to verify the genetic relationship among the grouper broodstock operational taxonomic units (OTUs). …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    EEG-Based Person Authentication Modelling Using Incremental Fuzzy-Rough Nearest Neighbour Technique by Liew, Siaw Hong

    Published 2016
    “…Wavelet Packet Decomposition (WPD), mean of amplitude, coherence, crosscorrelation, hjorth parameter and mutual information were used construct the proposed person authentication model. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Performance evaluation on quantized weight for convolutional neural network based object detection by Putra, Mohd Hasbullah

    Published 2021
    “…Three types of scalar quantization are used to quantize the CNN weights namely symmetric uniform quantizer, asymmetric uniform quantizer and non-uniform quantizer designed using k-means algorithm. The quantization reduces the storage and computation requirements. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Fusion model of unmanned aerial vehicle-based digital elevation model for accuracy improvement mapping by Isola, Ajibola Ismaila

    Published 2020
    “…The photos were processed using Agisoft algorithm. In the end, seven DEMs were exported in tiff file format. …”
    Get full text
    Get full text
    Thesis