Search Results - (( frames identification based algorithm ) OR ( java application testing algorithm ))

Refine Results
  1. 1

    Gender identification of children using hidden Markov model based on Mel-frequency cepstral coefficient / Adira Ibrahim by Adira, Ibrahim

    Published 2013
    “…HMM was trained with Baum-Welch algorithm and tested with Viterbi algorithm to get the gender identification accuracy. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Efficient tag grouping RFID anti-collision algorithm for internet of things applications based on improved k-means clustering by Umelo, Nnamdi Henry, Noordin, Nor Kamariah, A. Rasid, Mohd Fadlee, Tan, Kim Geok, Hashim, Fazirulhisyam

    Published 2023
    “…Dynamic Frame Slotted ALOHA (DFSA) is a de facto algorithm in the EPC Global Class-1 Generation-2 protocol for Radio Frequency Identification (RFID) tag collision problem. …”
    Get full text
    Get full text
    Article
  3. 3

    Grouping based radio frequency identification anti-collision protocols for dense internet of things application by Umelo, Nnamdi H., Noordin, Nor K., A. Rasid, Mohd Fadlee, Geok, Tan K., Hashim, Fazirulhisyam

    Published 2022
    “…The results also demonstrate FCMBG bettered other grouping-based algorithms (GB-DFSA and GBSA) whose tag estimation method are based on collision slots in terms slot efficiency by over 10% and also in terms of identification time.…”
    Get full text
    Get full text
    Article
  4. 4

    An Improved Action Key Frames Extraction Algorithm for Complex Colour Video Shot Summarization by Mizher, Manar Abduljabbar Ahmad, Ang, Mei Choo, Sheikh Abdullah, Siti Norul Huda, Kok, Weng Ng

    Published 2019
    “…The objective of this work is to improve our previous action key frames extraction algorithm (AKF) by adapting a threshold which selects action key frames as final key frames. …”
    Get full text
    Get full text
    Article
  5. 5

    AR oriented pose matching mechanism from motion capture data by Iqbal J., Sidhu M.S., Ariff M.B.M.

    Published 2023
    “…In order to extract the exact matched pose, the frame sequence is divided into pose feature frame and skeletal data frame by the use of pose matching dance training movement recognition algorithm (PMDTMR). …”
    Article
  6. 6

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  7. 7

    False path identification algorithm framework for nonseparable controller-data path circuits by Shaheen, Ateeq U. R., Hussin, Fawnizu Azmadi, Hamid, Nor Hisham

    Published 2016
    “…This paper proposes an algorithm frame-work to deal with these false paths through identification for DFT test. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Tracking of moving athlete from video sequences using fower pollination algorithm by Ong, Pauline, Chong, Tang Keat, Ong, Kok Meng, Low, Ee Soong

    Published 2022
    “…Subsequently, the hue, saturation and value (HSV) histogram of the region within the search window is evaluated. In the consecutive frame, several potential positions of the athlete are identifed, and the Bhattacharyya distance between the HSV histogram of the athlete in the previous frame and the potential position in the current frame is calculated. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Automated threshold detection for object segmentation in colour image by Akhtaruzzaman, Md., Shafie, Amir Akramin, Khan, Md. Raisuddin

    Published 2016
    “…In solving this issue, this paper presents an Automated Threshold Detection Algorithm, H(•). The algorithm is applied in segmenting human lower limbs from a series of image frames of human walking. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  10. 10
  11. 11
  12. 12

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…Performance Testing is used to test the performance of algorithm implementations in applications. …”
    Get full text
    Get full text
    Journal
  13. 13
  14. 14

    Particle swarm optimization with deep learning for human action recognition by Usmani, U.A., Watada, J., Jaafar, J., Aziz, I.A., Roy, A.

    Published 2021
    “…If the scene is stationary, the identification of the moving people is addressed based on the correlation tracking technique. …”
    Get full text
    Get full text
    Article
  15. 15
  16. 16

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  17. 17

    Classification System for Heart Disease Using Bayesian Classifier by Magendram, Anusha

    Published 2007
    “…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19
  20. 20

    Adaptive model predictive control based on wavelet network and online sequential extreme learning machine for nonlinear systems by Salih, Dhiadeen Mohammed

    Published 2015
    “…An analytical analysis based on ELM theories presented to prove the capability of the LWN to support the OSELM algorithm (LWN-OSELM). …”
    Get full text
    Get full text
    Thesis