Search Results - (( frames identification using algorithm ) OR ( java application testing algorithm ))

Refine Results
  1. 1

    Gender identification of children using hidden Markov model based on Mel-frequency cepstral coefficient / Adira Ibrahim by Adira, Ibrahim

    Published 2013
    “…HMM was trained with Baum-Welch algorithm and tested with Viterbi algorithm to get the gender identification accuracy. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Efficient tag grouping RFID anti-collision algorithm for internet of things applications based on improved k-means clustering by Umelo, Nnamdi Henry, Noordin, Nor Kamariah, A. Rasid, Mohd Fadlee, Tan, Kim Geok, Hashim, Fazirulhisyam

    Published 2023
    “…Dynamic Frame Slotted ALOHA (DFSA) is a de facto algorithm in the EPC Global Class-1 Generation-2 protocol for Radio Frequency Identification (RFID) tag collision problem. …”
    Get full text
    Get full text
    Article
  3. 3

    An Improved Action Key Frames Extraction Algorithm for Complex Colour Video Shot Summarization by Mizher, Manar Abduljabbar Ahmad, Ang, Mei Choo, Sheikh Abdullah, Siti Norul Huda, Kok, Weng Ng

    Published 2019
    “…The objective of this work is to improve our previous action key frames extraction algorithm (AKF) by adapting a threshold which selects action key frames as final key frames. …”
    Get full text
    Get full text
    Article
  4. 4
  5. 5

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  6. 6

    An Algorithm for Vehicle Detection and Tracking by Malik , Aamir Saeed

    Published 2010
    “…Median filtering is used for background extraction which is later subtracted from the motion frames for object detection. …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    False path identification algorithm framework for nonseparable controller-data path circuits by Shaheen, Ateeq U. R., Hussin, Fawnizu Azmadi, Hamid, Nor Hisham

    Published 2016
    “…This paper proposes an algorithm frame-work to deal with these false paths through identification for DFT test. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    AR oriented pose matching mechanism from motion capture data by Iqbal J., Sidhu M.S., Ariff M.B.M.

    Published 2023
    “…In this paper a mechanism for pose matching is presented based on extraction of skeletal data from the dance trainer's physical movements in the form of color defined images snapped by Kinect, where each pose is modelled by a sequence of key movements and continues data frames. In order to extract the exact matched pose, the frame sequence is divided into pose feature frame and skeletal data frame by the use of pose matching dance training movement recognition algorithm (PMDTMR). …”
    Article
  9. 9

    Tracking of moving athlete from video sequences using fower pollination algorithm by Ong, Pauline, Chong, Tang Keat, Ong, Kok Meng, Low, Ee Soong

    Published 2022
    “…Subsequently, the hue, saturation and value (HSV) histogram of the region within the search window is evaluated. In the consecutive frame, several potential positions of the athlete are identifed, and the Bhattacharyya distance between the HSV histogram of the athlete in the previous frame and the potential position in the current frame is calculated. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Automated threshold detection for object segmentation in colour image by Akhtaruzzaman, Md., Shafie, Amir Akramin, Khan, Md. Raisuddin

    Published 2016
    “…The algorithm is applied in segmenting human lower limbs from a series of image frames of human walking. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…Performance Testing is used to test the performance of algorithm implementations in applications. …”
    Get full text
    Get full text
    Journal
  12. 12
  13. 13

    Damage detection in frame structures using noisy accelerometers and Damage Load Vectors (DLV) by Toloue, I., Liew, M.S., Hamonangan Harahap, I.S., Lee, H.E.

    Published 2020
    “…The DLV method was subsequently employed to locate the damaged members using recorded frame vibration data that were obtained from 'noisy' accelerometers positioned on the frame at eight predefined locations. …”
    Get full text
    Get full text
    Article
  14. 14

    Damage detection in frame structures using noisy accelerometers and Damage Load Vectors (DLV) by Toloue, I., Liew, M.S., Hamonangan Harahap, I.S., Lee, H.E.

    Published 2020
    “…The DLV method was subsequently employed to locate the damaged members using recorded frame vibration data that were obtained from 'noisy' accelerometers positioned on the frame at eight predefined locations. …”
    Get full text
    Get full text
    Article
  15. 15
  16. 16
  17. 17
  18. 18

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  19. 19

    Classification System for Heart Disease Using Bayesian Classifier by Magendram, Anusha

    Published 2007
    “…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
    Get full text
    Get full text
    Thesis
  20. 20