Search Results - (( frames identification system algorithm ) OR ( java application using algorithm ))
Search alternatives:
- frames identification »
- identification system »
- system algorithm »
- java application »
- using algorithm »
-
1
Gender identification of children using hidden Markov model based on Mel-frequency cepstral coefficient / Adira Ibrahim
Published 2013“…HMM was trained with Baum-Welch algorithm and tested with Viterbi algorithm to get the gender identification accuracy. …”
Get full text
Get full text
Thesis -
2
An Improved Action Key Frames Extraction Algorithm for Complex Colour Video Shot Summarization
Published 2019“…The objective of this work is to improve our previous action key frames extraction algorithm (AKF) by adapting a threshold which selects action key frames as final key frames. …”
Get full text
Get full text
Article -
3
Efficient tag grouping RFID anti-collision algorithm for internet of things applications based on improved k-means clustering
Published 2023“…Dynamic Frame Slotted ALOHA (DFSA) is a de facto algorithm in the EPC Global Class-1 Generation-2 protocol for Radio Frequency Identification (RFID) tag collision problem. …”
Get full text
Get full text
Article -
4
-
5
Grouping based radio frequency identification anti-collision protocols for dense internet of things application
Published 2022“…Firstly, this paper validates through simulation the DFSA theory that efficiency of the RFID system is maximum when the number tags is approximately equal to the frame size. …”
Get full text
Get full text
Article -
6
An Algorithm for Vehicle Detection and Tracking
Published 2010“…One of the advantages of this system is that each vehicle in the frame is classified into different color boxes. …”
Get full text
Get full text
Conference or Workshop Item -
7
False path identification algorithm framework for nonseparable controller-data path circuits
Published 2016Get full text
Get full text
Conference or Workshop Item -
8
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
9
Tracking of moving athlete from video sequences using fower pollination algorithm
Published 2022“…Subsequently, the hue, saturation and value (HSV) histogram of the region within the search window is evaluated. In the consecutive frame, several potential positions of the athlete are identifed, and the Bhattacharyya distance between the HSV histogram of the athlete in the previous frame and the potential position in the current frame is calculated. …”
Get full text
Get full text
Get full text
Article -
10
-
11
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
12
An innovative approach for estimating the number of tags in RFID traffic monitoring systems
Published 2024“…This paper presents a new approach to estimate the number of tags within the reader's range in an RFID traffic monitoring system, with the goal of improving the dynamic framed slotted ALOHA anti-collision algorithm. …”
Get full text
Get full text
Get full text
Proceeding Paper -
13
Adaptive Non-Stationary Cardiac Signals Identification using an Augmented MLP Network
Published 2007Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Bio-signal identification using simple growing RBF-network (OLACA)
Published 2007Get full text
Get full text
Conference or Workshop Item -
15
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
17
A new algorithm for human face detection using skin color tone
Published 2013“…This system can detect a face regardless of the background of the picture, which is an important phase for face identification. …”
Get full text
Get full text
Get full text
Article -
18
-
19
Adaptive model predictive control based on wavelet network and online sequential extreme learning machine for nonlinear systems
Published 2015“…Furthermore, to develop WN-OSELM ability to learn the nonlinear system dynamics minimally, a linear term is added to the WN frame (LWN) so that it is enough to stabilize the open-loop unstable systems in the initial stages. …”
Get full text
Get full text
Thesis -
20
Real-time algorithmic music composition application.
Published 2022“…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis
