Search Results - (( data transition detection algorithm ) OR ( java application using algorithm ))
Search alternatives:
- transition detection »
- java application »
- data transition »
- using algorithm »
-
1
Temporal video segmentation using squared form of Krawtchouk-Tchebichef moments
Published 2018“…TVS algorithm design is still challenging because most of the recent methods are unable to achieve robust detection for different types of transitions: hard transition (HT) and soft transition (ST). …”
Get full text
Get full text
Get full text
Thesis -
2
Data in transit validation for cloud computing using cloud-based algorithm detection of injected objects
Published 2018“…Hence, a validation protocol algorithm based on hash function labelling provides a one-time security header for transferable files that protects data in transit against any unauthorized injection. …”
Get full text
Get full text
Get full text
Get full text
Article -
3
Fault detection with optimum March test algorithm
Published 2013“…This paper reveals the design methodology to generate DB covers all memories function by applying non-transition data, transition data, and single read and double read data. …”
Get full text
Get full text
Get full text
Article -
4
Fast temporal video segmentation based on Krawtchouk-Tchebichef moments
Published 2020“…The proposed algorithm is based on orthogonal moments which are considered as features to detect transitions. …”
Get full text
Get full text
Get full text
Article -
5
Fast shot boundary detection based on separable moments and support vector machine
Published 2021“…It aims to partition the video sequence into shots by detecting shot transitions. High computational cost in transition detection is considered a bottleneck for real-time applications. …”
Get full text
Get full text
Get full text
Article -
6
Missing tags detection algorithm for radio frequency identification (RFID) data stream
Published 2019“…Thus in this research, an AC complement algorithm with hashing algorithm and Detect False Negative Read algorithm (DFR) is used to developed the Missing Tags Detection Algorithm (MTDA). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
8
-
9
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
10
Testing static single cell faults using static and dynamic data background
Published 2011“…Both static and dynamic DB transitions are used in order to detect Deceptive Read Destructive Faults (DRDFs) and Write Disturb Faults (WDFs) that are not detected by previous algorithms. …”
Get full text
Get full text
Conference or Workshop Item -
11
-
12
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
14
Leveraging Web Scraping in Predictive Modelling of Supply Risk Detection
Published 2022“…By collecting data from news sites, this system is aimed to provide data for predictive modelling so it can be used to detect patterns in supply risks to create and predict the probability of a temporary event occurring in the future…”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
15
Multiple and solid data background scheme for testing static single cell faults on SRAM memories
Published 2013“…Therefore, the purpose of this thesis is to introduce a Data Background (DB) scheme to generate an optimal March Test Algorithm (MTA) for detecting faults of memory that are undetectable using existing algorithms. …”
Get full text
Get full text
Thesis -
16
Real-time algorithmic music composition application.
Published 2022“…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
17
A fast feature extraction algorithm for image and video processing
Published 2019“…Furthermore, the proposed method is employed for shot boundary detection (SBD) applications to detect transitions in video frames. …”
Get full text
Get full text
Conference or Workshop Item -
18
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
Get full text
Get full text
Conference or Workshop Item -
19
Application of Simon encryption algorithm for data transmission between sensor nodes in IoT environment
Published 2024“…Data encryption is one of the most implemented cybersecurity solutions as it provide data protection from being stolen by unauthorized parties. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
20
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item
