Search Results - (( developing controller matching algorithm ) OR ( java application interface algorithm ))

Refine Results
  1. 1

    Real-time algorithmic music composition application. by Yap, Alisa Yi Hui

    Published 2022
    “…In addition, the system also utilises JavaFx and jFugue for its graphical user interface and music programming respectively. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  2. 2

    Application-Programming Interface (API) for Song Recognition Systems by Murtadha Arif Sahbudin, Chakib Chaouch, Salvatore Serrano

    Published 2024
    “…In addition the implementation is done by algorithm using Java’s programming language, executed through an application developed in the Android operating system. …”
    Article
  3. 3

    Visdom: Smart guide robot for visually impaired people by Lee, Zhen Ting

    Published 2025
    “…The system architecture integrates ROS 2 on a Raspberry Pi, with TCP/IP connectivity enabling remote operation. An Android mobile application, developed using Java and the java.net.Socket library, provides an intuitive and accessible user interface for seamless interaction with the robot. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  4. 4
  5. 5

    Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework by Asaad Aref, Ibrahim

    Published 2004
    “…A design proposal was outlined to provide an adaptive client/server approach to stream audio contents using Real-Time Transport Protocol (RTP) involving architecture based on the Java Media Framework (JMF) Application Programmable Interfaces (API).RTP protocol is the Internet-standard protocol for the transport of real-time data, including audio and video and can be implemented by using Java Media Framework (JMF). …”
    Get full text
    Get full text
    Thesis
  6. 6

    A study on data-driven impedance matching in four channels bilateral teleoperation by Ramli, Mohd Syakirin, Ahmad, Hamzah, Razali, Saifudin, Othman, Nur Aqilah, Daud, Mohd Razali, Irawan, Addie, Mohd Nizam, Md Isa

    Published 2019
    “…The main objective of this research is to design and develop control algorithms to drive both sides of the master and slave system to attain symmetrical impedance between them. …”
    Get full text
    Get full text
    Research Report
  7. 7
  8. 8

    Quality inspection of engraved image using based matching approach by Norazlina , Ahmad, Marizan, Sulaiman, Muhamad Khairi, Aripin

    Published 2011
    “…This experiment result shows that the algorithm works better with detection rate of 100% and matching accuracy of more than 98%. …”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Shape-Based Matching: Application of Defect Detection by Harun, Mohamad Haniff, Sulaiman , Marizan, Hairol Nizam , Mohd Shah

    Published 2011
    “…This paper stresses more on the vision algorithm that mainly focus on shape-based matching application. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Flexible Approach for Region of Interest Creation for Shape-Based Matching in Vision System by Lim , Wee Teck, Sulaiman , Marizan, Mohd Shah, Hairol Nizam

    Published 2009
    “…This paper stress on the vision algorithm used which mainly focus on the shape matching properties of the product. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11
  12. 12

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  13. 13

    Multi-sources model and control algorithm of an energy management system by Hannan, MA, Azidin, FA, Mohamed, Azah

    Published 2012
    “…This study’s results suggest that the proposed control algorithm provides an efficient and feasible EMS for LEV.…”
    Get full text
    Get full text
    Article
  14. 14

    Online fingerprint recognition by Khairul Bariyah, Abd Rahim

    Published 2010
    “…For minutiae matching, the matching algorithm has been developed. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  15. 15

    Implementation of Shape – Based Matching Vision System in Flexible Manufacturing System by Lim , Wee Teck, Sulaiman , Marizan, Mohd Shah, Hairol Nizam, OMAR, ROSLI

    Published 2010
    “…This paper stress on the vision algorithm used which mainly focus on the shape matching properties of the product. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Implementation of Shape – Based Matching Vision System in Flexible Manufacturing System by Lim Wee, Teck, Sulaiman , Marizan, Mohd Shah, Hairol Nizam, Omar , Rosli

    Published 2010
    “…This paper stress on the vision algorithm used which mainly focus on the shape matching properties of the product. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    Face recognition door lock system / Danial Haziq Hakimi Salahuddin by Salahuddin, Danial Haziq Hakimi

    Published 2023
    “…The project involves designing and implementing a hardware and software solution that integrates a camera module, image processing algorithms, and a microcontroller based control unit. …”
    Get full text
    Get full text
    Student Project
  19. 19

    Development Of Control Algorithm For Spot Cooling System by Andy, Tan Wei Keat

    Published 2017
    “…This project’s aim is to develop a Control Algorithm for Spot Cooling system. …”
    Get full text
    Get full text
    Monograph
  20. 20

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…The application is designed to satisfy the user friendly interfaces and intent to be used by the end user without having the advanced knowledge in mobile security. …”
    Get full text
    Get full text
    Conference or Workshop Item