Search Results - (( java _ prevention algorithm ) OR ( using rectification using algorithm ))

Refine Results
  1. 1
  2. 2

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…A GUI is created in a form of JAVA application to display data detected from tag. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Investigation And Development Of Flattening Algorithms For Curved Latent Fingerprint Images by Chong, Bei Wei

    Published 2015
    “…Boundary of interested area can be acquired using a predefined algorithm or define by user using interactive drawing. …”
    Get full text
    Get full text
    Thesis
  4. 4

    OPTIMAL DESIGN AND ANALYSIS OF A DC–DC SYNCHRONOUS CONVERTER USING GENETIC ALGORITHM AND SIMULATED ANNEALING by K., S. Rama Rao., C. , -K, Chew

    Published 2009
    “…Abstract This paper presents the application of Genetic Algorithm (GA) and Simulated Annealing (SA) techniques for optimal design and analysis of a DC–DC converter with synchronous rectification normally used in battery charge/discharge circuits in DC uninterruptible power supply systems. …”
    Get full text
    Get full text
    Citation Index Journal
  5. 5

    OPTIMAL DESIGN AND ANALYSIS OF A DC–DC SYNCHRONOUS CONVERTER USING GENETIC ALGORITHM AND SIMULATED ANNEALING by K.S., Rama Rao, C. K., Chew

    Published 2009
    “…This paper presents the application of Genetic Algorithm (GA) and Simulated Annealing (SA) techniques for optimal design and analysis of a DC–DC converter with synchronous rectification normally used in battery charge/discharge circuits in DC uninterruptible power supply systems. …”
    Get full text
    Get full text
    Citation Index Journal
  6. 6

    A Practical Method for Camera Calibration in Stereo Vision Mobile Robot Navigation by Hamzah, Rostam Affendi, Abd Ghani, SHAMSUL FAKHAR, Kadmin, AHMAD FAUZAN, A Aziz, Khairul Azha

    Published 2012
    “…The algorithm uses Sum of Absolute Differences (SAD) which is developed using Matlab software.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    A Pixel to Pixel Correspondence and Region of Interest in Stereo Vision Application by Hamzah, Rostam Affendi, A Aziz, Khairul Azha, M Shokri, Ahmad Sayuthi

    Published 2012
    “…The algorithm uses Sum of Absolute Differences (SAD) which is developed using Matlab software. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Simulation and design of A DC-DC synchronous converter by intelligent optimization techniques by K., S. Rama Rao., Chew, Choon-keat

    Published 2010
    “…The design and analysis of the converter with the Genetic Algorithm are performed using software tools within the MATLAB/ SIMULINK environment. …”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    An Analysis Of Multiple Size Region Of Interest In Disparity Mapping For Stereo Vision Application by Hamzah, Rostam Affendi, Hamid, Mohd Saad, Rosly, Hasrul 'Nisham, Hashim, Nik Mohd Zarifie

    Published 2011
    “…The algorithm uses Sum of Absolute Differences (SAD) which is developed using Matlab software. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    A Pixel Matching Process And Multiples Roi For Stereo Images In Stereo Vision Application by Hamzah, Rostam Affendi, Salleh, Azahari, A Aziz, Khairul Azha, Mohammed Napiah, Zul Atfyi Fauzan

    Published 2011
    “…The algorithm uses Sum of Absolute Differences (SAD) which is developed using Matlab software. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…Obfuscation (Obfu) is a practice to make the programming code complicated to protect the Intellectual Property (IP) and prevent prohibited software Reverse Engineering (RE). …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    Biceps brachii surface EMG classification using neural networks by Chong, Yee Lin

    Published 2012
    “…The acquisition module is used to acquire EMG signals from the subject. Several signal processing methods are carried out in the preprocessing module, where the EMG signal will undergo a series of processes like filtering, rectification and integration. …”
    Get full text
    Thesis
  14. 14

    Message based random variable length key encryption algorithm. by Mirvaziri, Hamid, Jumari, Kasmiran, Ismail, Mahamod, Mohd Hanapi, Zurina

    Published 2009
    “…Results: Attack on the key generation process was prevented because of random key generation and its dependency to input message. …”
    Get full text
    Get full text
    Article
  15. 15

    The implications for ahybrid detection technique against malicious sqlattacks on web applications by Bahjat Arif, Sarajaldeen Akram, Wani, Sharyar

    Published 2025
    “…It is a code with double shield protection that prevents unauthorized extraction or damaging the remote database in the server side due to malicious SQL injection. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Development Of Machine Learning User Interface For Pump Diagnostics by Lee, Zhao Yang

    Published 2022
    “…The features extracted of time domain and frequency domain in vibration and acoustic will use as database of a Support Vector Machine (SVM) algorithms by using MATLAB R2021a. The result from the SVM algorithms will be used as database for the machine learning in Microsoft Azure. …”
    Get full text
    Get full text
    Monograph
  17. 17

    Online teleoperation of writing manipulator through graphics processing unit based accelerated stereo vision by Abu Raid, Fadi Imad Osman

    Published 2021
    “…The proposed algorithms aim to accelerate the processes of distortion removal and rectification using precomputed combined maps. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Investigation of impedance-based fault location techniques in power system network / Tan Feng Jie by Tan, Feng Jie

    Published 2019
    “…The estimated fault distances are evaluated using relative error based on total line length to determine the accuracy. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications by Hydara, Isatou

    Published 2015
    “…Most of the previously proposed approaches focused on preventing and detecting XSS attacks during runtime, after vulnerable applications are already deployed. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Safety Analysis Of Unsignalized Intersections Under Erroneous Road Crash Data Influence by Ahmed, Ashar

    Published 2016
    “…As a result of the rectification process, which involved the use of Nested Filtered Search Algorithm (NFSA) to match the accidents with the intersections where they might have occurred, 16 sites were correctly identified that initiated the second phase of the study. …”
    Get full text
    Get full text
    Thesis