Search Results - (( frequency identification _ algorithm ) OR ( java application using algorithm ))

Refine Results
  1. 1

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…A GUI is created in a form of JAVA application to display data detected from tag. …”
    Get full text
    Get full text
    Thesis
  2. 2

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  3. 3
  4. 4

    Implementation of Frequency Drift for Identification of Solar Radio Burst Type II by Roslan, Umar, Nur Zulaikha, Mohd Afandi, Zamri, Zainal Abidin

    Published 2016
    “…The results of the frequency drift implementation in classification algorithm show that the algorithm developed gave almost similar determination as in manual detection. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5
  6. 6

    Implementation of Frequency Drift for Identification of Solar Radio Burst Type II by Afandi, N.Z.M., Abidin, Z.Z., Umar, R., Sabri, N.H., Ibrahim, Z.A., Monstein, C.

    Published 2016
    “…The results of the frequency drift implementation in classification algorithm show that the algorithm developed gave almost similar determination as in manual detection. …”
    Get full text
    Get full text
    Article
  7. 7

    Analysis characteristic and performance of passive Radio Frequency Identification (RFID) for 13.56MHz system / Mohd Faizul Azmy Amat by Amat, Mohd Faizul Azmy

    Published 2007
    “…Scope of work include the algorithm for RFID flow in which frequency band will be continually implemented considering pre-determined constraints. …”
    Get full text
    Get full text
    Article
  8. 8

    Hybrid intelligent methods for parameter identification and load frequency control in power system by Aqeel Sakhy, Jaber

    Published 2014
    “…Where, in the first part, the coherent identification algorithm for single and multi-area power systems with disturbances is proposed. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Missing tags detection algorithm for radio frequency identification (RFID) data stream by Zainudin, Nur 'Aifaa

    Published 2019
    “…RFID technology is a radio frequency identification services that provide a reader reading the information of items from the tags. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Educational project on a simple voice identification using mel-frequency cepstrum coefficients and vector quantization by Akmeliawati, Rini, Widhiputranto, H. K.

    Published 2008
    “…The estimation fundamental frequency is performed with Harmonic Product Spectrum (HPS) algorithm, whilst MFCC is calculated using Discrete Cosine Transform, then, is modeled with Vector Quantization to compress the size of data to be processed and to assist identification.…”
    Get full text
    Get full text
    Proceeding Paper
  11. 11

    Analysis characteristic and performance of passive Radio Frequency Identification (RFID) for 13.56MHz system / Mohd Faizul Azmy Amat by Amat, Mohd Faizul Azmy

    Published 2007
    “…RFID (Radio Frequency Identification) is a technology that incorporates the use of electromagnetic or electrostatic An Radio Frequency Identification RFID system may consist of several component like tags and tags reader. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Effect of parameters variation on the performance of particle swarm optimization algorithm for tag coverage problem of radio frequency identification network by Nawawi, Azli, Hasnan, Khalid, Ngali, Zamani, Sidek, Noor Azizah

    Published 2016
    “…Optimal tag coverage is the most crucial aspect for deploying RFID (Radio Frequency Identification) system in a large scale. …”
    Get full text
    Get full text
    Article
  13. 13

    Identification of Electrooculography Signals Frequency Energy Distribution Using Wavelet Algorithm by W. Daud, W. M. Bukhari, Sudirman, Rubita, Omar, Camallil

    Published 2011
    “…Approach: We describe the identification of Electro-Oculograph (EOG) signals of eye movement potentials by using wavelet algorithm which gives a lot of information than FFT. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14
  15. 15
  16. 16

    Gender identification of children using hidden Markov model based on Mel-frequency cepstral coefficient / Adira Ibrahim by Adira, Ibrahim

    Published 2013
    “…HMM was trained with Baum-Welch algorithm and tested with Viterbi algorithm to get the gender identification accuracy. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Arabic Speaker Identification System for Forensic Authentication Using K-NN Algorithm by Abdulwahid S., Mahmoud M.A., Abdulwahid N.

    Published 2023
    “…Classification (of information); Data mining; Digital forensics; Forestry; Learning algorithms; Loudspeakers; Motion compensation; Nearest neighbor search; Speech recognition; Trees (mathematics); K-near neighbor; Logistic model tree; Logistics model; Mel frequency cepstral co-efficient; Mel frequency cepstral coefficient; Mel-frequency cepstral coefficients; Mining classification; Model trees; Nearest-neighbour; Speaker identification systems; Authentication…”
    Conference Paper
  18. 18

    Real-Time Video Processing Using Native Programming on Android Platform by Saipullah, Khairul Muzzammil

    Published 2012
    “…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19
  20. 20