Search Results - (( frames information needs algorithm ) OR ( java application stemming algorithm ))

Refine Results
  1. 1

    Restoration of missing data in old archives based on genetic algorithm by Khammar, Mohammad Reza, Saripan, M. Iqbal, Marhaban, Mohammad Hamiruce, Ishak, Asnor Juraiza, Zolfaghari, Fateme

    Published 2014
    “…The information of previous or next frames is not needed in this implementation. …”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    REGION-BASED ADAPTIVE DISTRIBUTED VIDEO CODING CODEC by ABDELRAHMAN ELAMIN, ABDELRAHMAN ELAMIN

    Published 2011
    “…The compression is achieved by sending only that extra information that is needed to correct this estimation. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Shot boundary detection based on orthogonal polynomial by Abdulhussain, Sadiq H., Ramli, Abd Rahman, Mahmmod, Basheera M., Saripan, Mohd Iqbal, Al-Haddad, Syed Abdul Rahman, Jassim, Wissam A.

    Published 2019
    “…Moments are used because of their ability to represent signal (video frame) without information redundancy. These features are the moments of smoothed and gradients of video frames. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Agro-ento bioinformation: towards the edge of reality by Syed Hassan, Syed Tajuddin

    Published 2002
    “…Bioinformation, in brief, comprises biology, information algorithms, information technology, and communication protocols. …”
    Get full text
    Get full text
    Inaugural Lecture
  5. 5

    Applying genetic algorithm for solving travelling salesman problem in Skynet Courier Service / Nah Izzattie Itqan Ahmad Nah Rodzi by Ahmad Nah Rodzi, Nah Izzattie Itqan

    Published 2020
    “…Most of the time not all the items can be sent within the specific time frame because the riders are lack of information in seeking how to determine the sequence of the road when doing a delivery. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7
  8. 8

    Efficient management of Top-k queries over Uncertain Data Streams with dynamic Sliding Window Model by Raja Wahab, Raja Azhan Syah

    Published 2024
    “…Today, the advancement of information technology has led to a growing need for continuous processing of significant events, such as enhanced methods for monitoring road speed and mobile computing. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Enhanced 3D terrain visualization process using game engine by Mohd Hafiz, Mahayudin

    Published 2018
    “…Furthermore, operating system resource needs to be used before it goes online. The main finding of this study is the new algorithm of enhancing 3D terrain visualization process using Unity3D game engine. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    The Fuzzy Logic Approach for Modelling Object Physical Features and Holes Occupancies by Syed Abdul Hamid , Syed Mohamad Shazali, Sulaiman , Marizan, Said, Mohamed Azmi

    Published 2008
    “…The system discussed in this paper had successfully tested and no camera calibration needed because the system has self calibration effect since the cupboard had modelled by the information of the holes of the cupboard and not by it environment. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Investigating rendering speed and download rate of three-dimension (3D) mobile map intended for navigation aid using genetic algorithm by Abubakar, Adamu, Zeki, Akram M., Chiroma, Haruna, Herawan, Tutut

    Published 2014
    “…Now it has become possible with a wireless network to render large and detailed 3D map of cities in mobile devices at interactive rates of over 30 frame rate per second (fps). The information in 3D map is generally limited and lack interaction when it’s not rendered at interactive rate; on the other hand, with high download rate 3D map is able to produce a realistic scene for navigation aid. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  12. 12

    Implementation of a Symmetric Chaotic Encryption Scheme by Sivanandan, Easwari

    Published 2004
    “…Voice privacy and security needs to focused upon and data encryption techniques are the answers in providing the security needed. …”
    Get full text
    Get full text
    Final Year Project
  13. 13
  14. 14
  15. 15

    Traffic congestion detection for smart and control transportation management by Khalifa, Othman Omran, Marzuki, Azri A., Abdul Malik, Noreha, Hassan Gani, Mohammad H.

    Published 2020
    “…This would require the use of image processing algorithms and techniques within the bounds of the software tool MATLAB and other companion tools that would automatically indicate the presence of vehicles within a certain frame to further deduce the concentration of vehicle within the area.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  16. 16

    Traffic congestion detection for smart and control transportation management by Khalifa, Othman Omran, Marzuki, Azri A., Abdul Malik, Noreha, Hassan Gani, Mohammad H.

    Published 2022
    “…This would require the use of image processing algorithms and techniques within the bounds of the software tool MATLAB and other companion tools that would automatically indicate the presence of vehicles within a certain frame to further deduce the concentration of vehicle within the area.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  17. 17
  18. 18
  19. 19

    Embedded vision system development using 32-bit Single Board Computer and GNU/Linux by Nur Farhan, Kahar

    Published 2011
    “…The image processing algorithm includes color space conversion and motion analysis technique. …”
    Get full text
    Thesis
  20. 20

    Correlation-based subset evaluation of feature selection for dynamic Malaysian sign language by Sutarman, .

    Published 2016
    “…One factor is the quality of the data or information held. The process of data model extraction will be more difficult if the information held is irrelevant or contains redundancies, or if the data obtained contains high noise. …”
    Get full text
    Get full text
    Thesis