Search Results - (( developing frames extraction algorithm ) OR ( java detection using algorithm ))

Refine Results
  1. 1

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    An improved method in speech signal input representation based on DTW technique for NN speech recognition system by Sudirman, Rubita, Salleh, Sh. Hussain, Salleh, Shaharuddin

    Published 2007
    “…The Dynamic Time Warping algorithm (DTW) is the back–bone of the newly developed algorithm called DTW fixing frame algorithm (DTW–FF) which is designed to perform template matching for the input preprocessing. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Three-phase three-level shunt active power filter with simplified synchronous reference frame by Hoon, Yap, Mohd Radzi, Mohd Amran, Hassan, Mohd Khair, Mailah, Nashiren Farzilah

    Published 2016
    “…In its controller, Synchronous Reference Frame (SRF) principle has widely been applied in current harmonics extraction algorithm due to its simple implementation features. …”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Real-Time Video Processing Using Native Programming on Android Platform by Saipullah, Khairul Muzzammil

    Published 2012
    “…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6
  7. 7
  8. 8

    A new multi-frames watermarking technique for tamper detection and recovery by Khor, Hui Liang

    Published 2017
    “…The objectives of the research are to resolve the time constraint of sequential multi-frames watermarking process. The sequential multi-frames watermarking process could be speed up by two methods, first method was designed a speedy watermarking scheme algorithm (ROI-DR) in a single frame of medical image, and the second method was developed a new multi-frames watermarking scheme by adding parallelism component into sequential multi-frames watermarking process. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Image Stitching Of Aerial Footage by Ng, Wei Haen

    Published 2021
    “…In this project, an image stitching framework is proposed to take aerial footage as input data. The proposed algorithm extracts the frames of the aerial footage and undistorts the bird-eye-effect of the images to remove the noises. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  10. 10

    Image classification using two dimensional wavelet coefficients with parallel computing by Ong, Yew Fai

    Published 2020
    “…Whenever an area with the similar characteristic is verified in the next frame, the area will be identified and bounded with a rectangle through the object recognition algorithm of the research. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  11. 11
  12. 12

    A wavelet based watermarking algorithm for video by Hussin, Saleh, Babakr, Elsadig, Ramli, Abd Rahman, Al-Hadad, Sayed R.

    Published 2005
    “…In this paper, a video watermarking algorithm based on wavelets is proposed. In this algorithm, to achieve better imperceptibility and robustness a binary image watermark is inserted into the middle frequency subband coefficients of the blue component of the video frame. …”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Identification of microcalcification in mammographic images / Noor Azliza Abdul Shauti by Abdul Shauti, Noor Azliza

    Published 2008
    “…By using this identification, it can simulate in flexible images post processing and analysis in easy image management using Java aplication. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…An Intrusion Detection System is software or application which is used to detect thread, malicious activities and the unauthorized access to the computer system and warn the administrators by generating alarms. …”
    Get full text
    Get full text
    Thesis
  15. 15

    HUMAN MOTION ANALYSIS IN VIDEO SURVEILLANCE SYSTEM by LO , TIMOTHY YIN HONG

    Published 2019
    “…A video sequence consists of sequences of frame, with the detection algorithm, these frames can be analyzed and detect any” “abnormal behavior such as crime.” …”
    Get full text
    Get full text
    Final Year Project
  16. 16

    Gender identification of children using hidden Markov model based on Mel-frequency cepstral coefficient / Adira Ibrahim by Adira, Ibrahim

    Published 2013
    “…Mel Frequency Cepstral Coefficient (MFCC) was applied as the feature extraction method. HMM was trained with Baum-Welch algorithm and tested with Viterbi algorithm to get the gender identification accuracy. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Development Of A Robust Blind Digital Video Watermarking Algorithm Using Discrete Wavelet Transform by Al-Deen, Ahmed A. Baha'a

    Published 2007
    “…The aim of this research is to develop a video watermarking algorithm to embed a binary image inside the uncoded video stream that acts as a logo. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Fitness value based evolution algorithm approach for text steganalysis model by Din, Roshidi, Samsudin, Azman, Tuan Muda, Tuan Zalizam, Lertkrai, P., Amphawan, Angela, Omar, Mohd Nizam

    Published 2013
    “…In this paper, we present a new alternative method for text steganalysis based on an evolution algorithm, implemented using the Java Evolution Algorithms Package (JEAP).The main objective of this paper is to detect the existence of hidden messages ased on fitness values of a text description.It is found that the detection performance has been influenced by two groups of fitness values which are good fitness value and bad fitness value. …”
    Get full text
    Get full text
    Article
  19. 19
  20. 20

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…A GUI is created in a form of JAVA application to display data detected from tag. …”
    Get full text
    Get full text
    Thesis