Search Results - (( frames operation _ algorithm ) OR ( java application using algorithm ))
Search alternatives:
- frames operation »
- java application »
- using algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
-
3
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
4
An Algorithm for Vehicle Detection and Tracking
Published 2010“…Median filtering is used for background extraction which is later subtracted from the motion frames for object detection. Morphological operators are employed for blob extraction. …”
Get full text
Get full text
Conference or Workshop Item -
5
A simplified synchronous reference frame for indirect current controlled three-level inverter-based shunt active power filters
Published 2016“…This paper presents a new simplified harmonics extraction algorithm based on the synchronous reference frame (SRF) for an indirect current controlled (ICC) three-level neutral point diode clamped (NPC) inverter-based shunt active power filter (SAPF). …”
Get full text
Get full text
Article -
6
Enhanced algorithm for energy-saving mechanism and frame response time reduction in IEEE 802.16e WiMAX
Published 2010“…At high traffic region, the reduction of 21.5% is obtained in energy consumption for each sleep mode operation. Adjusting Tmax results in reducing 53% of frame response time. …”
Get full text
Get full text
Thesis -
7
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
9
Video surveillance: Item monitoring against theft
Published 2023“…After that, the system will get the current frame to find the common features with the background frame by using a feature matching algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
10
Eccentricity Optimization of NGB System by using Multi-Objective Genetic Algorithm
Published 2009“…Boundary equations are set by introducing feasible area to avoid improper individuals followed by utilization of some operators such as selection, mutation, crossover and elite genetic algorithm. …”
Get full text
Get full text
Article -
11
Real-time algorithmic music composition application.
Published 2022“…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
12
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
Get full text
Get full text
Conference or Workshop Item -
13
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
14
Application of genetic algorithm and JFugue in an evolutionary music generator
Published 2025“…This project explores the application of Genetic Algorithms (GA) with JFugue, which is a Java-based music programming library to develop an Evolutionary Music Generator. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
15
Fast algorithm analysis and bit-serial architecture design for sub-pixel motion estimation in H.264
Published 2010“…In the architecture level, we propose a novel bit-serial architecture for our algorithm. Due to advantages of the bit-serial architecture, it has a low gate count, high speed operation frequency, low density interconnection, and a reduced number of I/O pins. …”
Get full text
Article -
16
-
17
Route Optimization System
Published 2005“…The method used to develop this project is Rapid Application Development (RAD). …”
Get full text
Get full text
Final Year Project -
18
EMBEDDED PRESENTER TRACKING SYSTEM
Published 2018“…A webcam is used for the prototype to provide visual input for the system before the Viola-Jones algorithm is used to detect the presence of a human face within the video frame input. …”
Get full text
Get full text
Final Year Project -
19
A fuzzy approach for early human action detection / Ekta Vats
Published 2016“…Therefore, a new space-time fuzzy implication operator is introduced, by modifying the existing implication operators to accommodate time as an added dimension. …”
Get full text
Get full text
Thesis -
20
Secure Image Steganography Using Encryption Algorithm
Published 2016“…Diffie-Hellman algorithm is used to determine the pixel on an image that will be used to store the message. …”
Get full text
Get full text
Conference or Workshop Item
