Search Results - (( frames information data algorithm ) OR ( java application testing algorithm ))

Refine Results
  1. 1

    Restoration of missing data in old archives based on genetic algorithm by Khammar, Mohammad Reza, Saripan, M. Iqbal, Marhaban, Mohammad Hamiruce, Ishak, Asnor Juraiza, Zolfaghari, Fateme

    Published 2014
    “…The information of previous or next frames is not needed in this implementation. …”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  3. 3

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…Performance Testing is used to test the performance of algorithm implementations in applications. …”
    Get full text
    Get full text
    Journal
  4. 4

    Ulcer detection and classification of wireless capsule endoscopy images using RGB masking by Suman, S., Hussi, F.A., Nicolas, W., Malik, A.S.

    Published 2016
    “…This algorithm of capsule images can be clinically very useful as it can discriminate between normal and abnormal frame. …”
    Get full text
    Get full text
    Article
  5. 5

    Ulcer detection and classification of wireless capsule endoscopy images using RGB masking by Suman, S., Hussi, F.A., Nicolas, W., Malik, A.S.

    Published 2016
    “…This algorithm of capsule images can be clinically very useful as it can discriminate between normal and abnormal frame. …”
    Get full text
    Get full text
    Article
  6. 6

    Development of obstable avoidance system for 3D robot navigation by Er, Kai Sheng

    Published 2024
    “…To prepare for obstacle avoidance algorithm development, a differential drive robot was constructed, and a URDF description was prepared to ensure correct odometry data conversion from sensor coordinate frames to the robot coordinate frame. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  7. 7
  8. 8

    Fast shot boundary detection based on separable moments and support vector machine by Idan, Zinah N., Abdulhussain, Sadiq H., Mahmmod, Basheera M., Al-Utaibi, Khaled A., Syed Abdul Rahman Al-, Syed Abdul Rahman Al-Hadad, Sait, Sadiq M.

    Published 2021
    “…The proposed SBD framework is based on the concept of candidate segment selection with frame active area and separable moments. First, for each frame, the active area is selected such that only the informative content is considered. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Frame selection based on modified entropy and object motion for secured data hiding in videos by Muhammad Fuad, Abdullah

    Published 2021
    “…The proposed frame selections provided additional security where the hidden data were difficult to be detected. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Moving objects detection from UAV captured videos using trajectories of matched regional adjacency graphs by Harandi, Bahareh Kalantar Ghorashi

    Published 2017
    “…Trajectory information is also considered across multiple frames taking into account many types of transformations. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Image classification using two dimensional wavelet coefficients with parallel computing by Ong, Yew Fai

    Published 2020
    “…Whenever an area with the similar characteristic is verified in the next frame, the area will be identified and bounded with a rectangle through the object recognition algorithm of the research. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  12. 12
  13. 13

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  14. 14

    Depth map and 3D imaging applications: Algorithms and technologies by Malik, Aamir Saeed, Choi, Tae-Sun, Nisar, Humaira

    Published 2012
    “…Then the 3D body model and 3D data are co-registered with our devised algorithm that works in two steps: the first step assigns the labels of body parts to each point of the 3D data; the second step computes the kinematic angles to fit the 3D human model to the labeled 3D data. …”
    Get full text
    Get full text
    Book Section
  15. 15

    Intelligent auto tracking in 3D space by image processing by Al-Khateeb, Khalid A. Saeed, Awang, Mat Kamil, Khalifa, Othman Omran

    Published 2009
    “…The servo drive signals for both the robot motion and the angular positioning of the cameras are derived from the image processing algorithm that keeps the centroid of the target image in the center of the frame and the target in line with the axis of the optical system. …”
    Get full text
    Get full text
    Proceeding Paper
  16. 16

    Classification System for Heart Disease Using Bayesian Classifier by Magendram, Anusha

    Published 2007
    “…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Enhancing selective encryption for H.264/AVC using advanced encryption standard by Abomhara, Mohamed, Zakaria, Omar, Khalifa, Othman Omran, Zaidan, Aos Alaa, Zaidan, Bilal Bahaa

    Published 2010
    “…But with this availability comes problems of maintaining the security of information that is displayed in public. Many approaches have been used or proposed for providing security for information dissemination over networks, protection system classified with more specific as encryption information, and combination between video compression and encryption to increase information security. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18
  19. 19
  20. 20