Search Results - (( developing program walking algorithm ) OR ( java identification using algorithm ))

Refine Results
  1. 1

    Identification of microcalcification in mammographic images / Noor Azliza Abdul Shauti by Abdul Shauti, Noor Azliza

    Published 2008
    “…By using this identification, it can simulate in flexible images post processing and analysis in easy image management using Java aplication. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Face recognition and identification system (FaceRec) / Khew Jye Huei by Khew , Jye Huei

    Published 2004
    “…It describes the implementation and functions of a working system that performs the recognition and identification of human faces using the implement algorithms. …”
    Get full text
    Get full text
    Thesis
  4. 4

    A Model for Evaluation of Cryptography Algorithm on UUM Portal by Norliana, Abdul Majid

    Published 2004
    “…The simulation model was developed using Active Server Page, JavaScript and SQL 7.0 as database. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment by Ruzita, Ahmad

    Published 2013
    “…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The proposed protocol using 64 bits index is proved having the lowest non-unequivocally identification probability. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Framework for pedestrian walking behaviour recognition to minimize road accident by Hashim Kareem, Zahraa

    Published 2021
    “…Fourthly, four standard vectors for pedestrian walking behaviour are developed. Fifthly, the performance of the proposed classification methods is validated and evaluated against multiple scenarios and features. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Framework for pedestrian walking behaviour recognition to minimize road accident by Hashim Kareem, Zahraa

    Published 2021
    “…Fourthly, four standard vectors for pedestrian walking behaviour are developed. Fifthly, the performance of the proposed classification methods is validated and evaluated against multiple scenarios and features. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    3D solid robot animation design based on ADAMS by Baojian Yang, Yongning Deng, Xia Yue, Tze, Kenneth Kin Teo

    Published 2023
    “…It is of great significance to propose an efficient and improved inverse kinematics algorithm for the development of robotic bionics in China. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Obstacle avoidance legged robot by Mohamed Faizan, Basheer Ahmad

    Published 2008
    “…A PIC Microcontroller has been implemented to act as a brain for the robot that controls the walking and turning algorithm. Ultrasonic sensor was also developed to act as an ‘eye’ to the system and tells the brain about existence of obstacle in front. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  12. 12
  13. 13

    Development of Hexapod Robot with Manoeuvrable Wheel by mohd zamzuri, abdul rashid, Mohd Aras, Mohd Shahrieel, Anuar , Mohamed Kassim, Annisa , Jamali

    Published 2012
    “…The decisions for the robot to use either wheel or legs are based on the sensory devices and algorithm develops at the controller attached to the robot.…”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Automated pavement imaging program (APIP) for pavement cracks classification and quantification – a photogrammetric approach by Mustaffar, Mushairry, Puan, O. C., Ling, Tung Chai

    Published 2008
    “…This research is aimed at the development of an Automated Pavement Imaging Program (APIP) for evaluating pavement distress condition. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    A framework of test case prioritisation in regression testing using particle swarm-artificial bee colony algorithm by Ba-Quttayyan, Bakr Salim Abdullah

    Published 2024
    “…Regression test case prioritisation (TCP) is used to revalidate modified software, ensuring its quality before release on the digital market. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Evaluation of cracks and disintegrations using close-range digital photogrammetry and image processing technique by Ling, Tung Chai

    Published 2005
    “…This research is aimed at the development of an Automated Pavement Imaging Program (APIP) for evaluating pavement distress condition. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Development of Hexapod Robot with Manoeuvrable Wheel by Mohd Zamzuri, Ab Rashid, Mohd Shahrieel, Mohd Aras, A. A., Radzak, Anuar, Mohamed Kassim, Annisa, Jamali

    Published 2012
    “…The decisions for the robot to use either wheel or legs are based on the sensory devices and algorithm develops at the controller attached to the robot.…”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    An Agent-Based System with Personalization and Intelligent Assistance Services for Facilitating Knowledge Sharing by Mohd Sharef, Nurfadhlina

    Published 2006
    “…KSFaci is embedded in web environment and is implemented using Java Servlet and runs under Apache server. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee by Por, Lip Yee

    Published 2012
    “…Two falsifying authentication methods using: (i) penup event and neighbouring connectivity manipulation; and (ii) partial password selection and metaheuristic randomisation algorithm methods, were proposed. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis