Search Results - (( frames extraction term algorithm ) OR ( java application testing algorithm ))
Search alternatives:
- application testing »
- frames extraction »
- testing algorithm »
- java application »
- extraction term »
- term algorithm »
-
1
An Improved Action Key Frames Extraction Algorithm for Complex Colour Video Shot Summarization
Published 2019“…The objective of this work is to improve our previous action key frames extraction algorithm (AKF) by adapting a threshold which selects action key frames as final key frames. …”
Get full text
Get full text
Article -
2
AR oriented pose matching mechanism from motion capture data
Published 2023“…In order to extract the exact matched pose, the frame sequence is divided into pose feature frame and skeletal data frame by the use of pose matching dance training movement recognition algorithm (PMDTMR). …”
Article -
3
A simplified synchronous reference frame for indirect current controlled three-level inverter-based shunt active power filters
Published 2016“…This paper presents a new simplified harmonics extraction algorithm based on the synchronous reference frame (SRF) for an indirect current controlled (ICC) three-level neutral point diode clamped (NPC) inverter-based shunt active power filter (SAPF). …”
Get full text
Get full text
Article -
4
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
5
Fast adaptive motion estimation search algorithm for H.264 encoder
Published 2012“…Furthermore this study presents an analysis of the performance of the proposed algorithm in terms of motion estimation time, total encoding time, video quality (PSNR), and bit rate. …”
Get full text
Get full text
Thesis -
6
Development Of A Robust Blind Digital Video Watermarking Algorithm Using Discrete Wavelet Transform
Published 2007“…On the other hand, a random key is used to choose the frames to be watermarked to increase the security level of the algorithm and discourage piracy. …”
Get full text
Get full text
Thesis -
7
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. …”
Get full text
Get full text
Journal -
8
Time-domain harmonic extraction algorithms for three-level inverter-based shunt active power filter under steady-state and dynamic-state conditions-an evaluation study
Published 2023“…Comprehensive results are provided to confirm mitigation performance of the SAPF utilizing each harmonic extraction algorithm. Copyright � 2020 Institute of Advanced Engineering and Science. …”
Review -
9
Improving performance of automated coronary arterial tree center-line extraction, stent localization and tracking
Published 2012“…Over the last decade, many algorithms have been developed to address this problem. …”
Get full text
Get full text
Thesis -
10
-
11
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
12
Classification System for Heart Disease Using Bayesian Classifier
Published 2007“…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
Get full text
Get full text
Thesis -
13
-
14
Improving invisibility of blind video watermarking scheme
Published 2007“…An inverse transformation should be taken in order to get the desired watermarked video shot. In extraction process the watermark is extracted from the marked video directly without access to the original video. …”
Get full text
Get full text
Conference or Workshop Item -
15
-
16
A Reinforcement Learning Based Adaptive ROI Generation for Video Object Segmentation
Published 2021“…Furthermore, relocating the segmentation target in the next frame is difficult if it is lost in the current frame during the segmentation process. …”
Get full text
Get full text
Article -
17
Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli
Published 2019“…The programming language that is used to write the program is Java Language that will run on android phones. As the result, this project was tested on the functionality of the mobile messaging application. …”
Get full text
Get full text
Student Project -
18
Design Of Robot Motion Planning Algorithm For Wall Following Robot
Published 2006Get full text
Get full text
Monograph -
19
Security Analysis Between Static And Dynamic S-boxes In Block Ciphers
Published 2024Get full text
Article -
20
