Search Results - (( frames identification system algorithm ) OR ( java application testing algorithm ))

Refine Results
  1. 1

    Gender identification of children using hidden Markov model based on Mel-frequency cepstral coefficient / Adira Ibrahim by Adira, Ibrahim

    Published 2013
    “…HMM was trained with Baum-Welch algorithm and tested with Viterbi algorithm to get the gender identification accuracy. …”
    Get full text
    Get full text
    Thesis
  2. 2

    An Improved Action Key Frames Extraction Algorithm for Complex Colour Video Shot Summarization by Mizher, Manar Abduljabbar Ahmad, Ang, Mei Choo, Sheikh Abdullah, Siti Norul Huda, Kok, Weng Ng

    Published 2019
    “…The objective of this work is to improve our previous action key frames extraction algorithm (AKF) by adapting a threshold which selects action key frames as final key frames. …”
    Get full text
    Get full text
    Article
  3. 3

    Efficient tag grouping RFID anti-collision algorithm for internet of things applications based on improved k-means clustering by Umelo, Nnamdi Henry, Noordin, Nor Kamariah, A. Rasid, Mohd Fadlee, Tan, Kim Geok, Hashim, Fazirulhisyam

    Published 2023
    “…Dynamic Frame Slotted ALOHA (DFSA) is a de facto algorithm in the EPC Global Class-1 Generation-2 protocol for Radio Frequency Identification (RFID) tag collision problem. …”
    Get full text
    Get full text
    Article
  4. 4
  5. 5

    Grouping based radio frequency identification anti-collision protocols for dense internet of things application by Umelo, Nnamdi H., Noordin, Nor K., A. Rasid, Mohd Fadlee, Geok, Tan K., Hashim, Fazirulhisyam

    Published 2022
    “…Firstly, this paper validates through simulation the DFSA theory that efficiency of the RFID system is maximum when the number tags is approximately equal to the frame size. …”
    Get full text
    Get full text
    Article
  6. 6

    An Algorithm for Vehicle Detection and Tracking by Malik , Aamir Saeed

    Published 2010
    “…One of the advantages of this system is that each vehicle in the frame is classified into different color boxes. …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7
  8. 8

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  9. 9

    Tracking of moving athlete from video sequences using fower pollination algorithm by Ong, Pauline, Chong, Tang Keat, Ong, Kok Meng, Low, Ee Soong

    Published 2022
    “…Subsequently, the hue, saturation and value (HSV) histogram of the region within the search window is evaluated. In the consecutive frame, several potential positions of the athlete are identifed, and the Bhattacharyya distance between the HSV histogram of the athlete in the previous frame and the potential position in the current frame is calculated. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…Performance Testing is used to test the performance of algorithm implementations in applications. …”
    Get full text
    Get full text
    Journal
  11. 11

    An innovative approach for estimating the number of tags in RFID traffic monitoring systems by Chebil, Jalel, Habaebi, Mohamed Hadi, Islam, Md. Rafiqul

    Published 2024
    “…This paper presents a new approach to estimate the number of tags within the reader's range in an RFID traffic monitoring system, with the goal of improving the dynamic framed slotted ALOHA anti-collision algorithm. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  12. 12
  13. 13
  14. 14

    A new algorithm for human face detection using skin color tone by Zangana, Hewa Majeed, Alshaikhli, Imad Fakhri Taha

    Published 2013
    “…This system can detect a face regardless of the background of the picture, which is an important phase for face identification. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15
  16. 16

    Adaptive model predictive control based on wavelet network and online sequential extreme learning machine for nonlinear systems by Salih, Dhiadeen Mohammed

    Published 2015
    “…Furthermore, to develop WN-OSELM ability to learn the nonlinear system dynamics minimally, a linear term is added to the WN frame (LWN) so that it is enough to stabilize the open-loop unstable systems in the initial stages. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  19. 19
  20. 20

    Thermal Imaging Analysis of Potentially Harmful Subject for Night Vision System by Noor Amira Syuhada, Mahamad Salleh, Kamarul Hawari, Ghazali

    Published 2013
    “…The selection of the correct technique is followed the specification, process and output from this thermal surveillance system. The method of frame difference is used since the detection is on the moving subject. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item