Search Results - (( java application based algorithm ) OR ( using vector window algorithm ))

Refine Results
  1. 1

    Block Motion Estimation Using Directional Adaptive Search Window by Fadly Chew, Nor Farhana, Badruddin, Nasreen

    Published 2006
    “…This classification and the direction of the motion vectors, are used to dynamically adjust the search window size and general orientation. …”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    Design of intelligent Qira’at identification algorithm by Kamarudin, Noraziahtulhidayu

    Published 2017
    “…For the feature vectors that are collected from feature extraction (MFCC) and feature selection (X-ACO), the feature vectors are used as input for the classification phase. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Block motion estimation using directional adaptive search window by Chew , N.F.F., Badruddin ., Nasreen

    Published 2007
    “…This classification and the direction of the motion vectors, are used to dynamically adjust the search window size and general orientation. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  5. 5

    Epileptic Seizure Detection Using Singular Values And Classical Features Of EEG Signals by Ahmed, Ahmed Elsayed Elmahdy

    Published 2014
    “…In this algorithm a sliding window of one second is utilized to check for epileptic seizure at each second and the classification method used is support vector machine (SVM). …”
    Get full text
    Get full text
    Final Year Project
  6. 6
  7. 7

    BLOCK MOTION ESTIMATION USING DIRECTIONAL ADAPTIVE SEARCH WINDOW by Fadly Chew, NorFarhana

    Published 2006
    “…From the magnitude and direction of the x andy motion vector components, the search window (search range) is dynamically adjusted. …”
    Get full text
    Get full text
    Final Year Project
  8. 8

    Application of genetic algorithm and JFugue in an evolutionary music generator by Tang, Jia Rou

    Published 2025
    “…This project explores the application of Genetic Algorithms (GA) with JFugue, which is a Java-based music programming library to develop an Evolutionary Music Generator. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  9. 9
  10. 10
  11. 11

    Real-Time Video Processing Using Native Programming on Android Platform by Saipullah, Khairul Muzzammil

    Published 2012
    “…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12
  13. 13

    Fast directional search algorithm for fractional pixel motion estimation for H.264 AVC by Nisar, Humaira, Malik, Aamir Saeed, Choi, Tae-Sun, Yap, Vooi Voon

    Published 2013
    “…To reduce the complexity of fractional pixel ME, unimodal error surface assumption is used to check only some points in the fractional pixel search window. …”
    Get full text
    Get full text
    Citation Index Journal
  14. 14

    Real-time algorithmic music composition application. by Yap, Alisa Yi Hui

    Published 2022
    “…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  15. 15

    Non-fiducial based electrocardiogram biometrics with kernel methods by Hejazi, Maryamsadat

    Published 2017
    “…At classification level, Gaussian multi-class Support Vector Machine (SVM) with the One-Against-All (OAA) approach is proposed to evaluate verification performance rates of the feature extraction algorithms. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework by Asaad Aref, Ibrahim

    Published 2004
    “…A design proposal was outlined to provide an adaptive client/server approach to stream audio contents using Real-Time Transport Protocol (RTP) involving architecture based on the Java Media Framework (JMF) Application Programmable Interfaces (API).RTP protocol is the Internet-standard protocol for the transport of real-time data, including audio and video and can be implemented by using Java Media Framework (JMF). …”
    Get full text
    Get full text
    Thesis
  17. 17

    A Toolkit for Simulation of Desktop Grid Environment by FOROUSHAN, PAYAM CHINI

    Published 2014
    “…The selected methodology for the application development is based on prototyping methodology. …”
    Get full text
    Get full text
    Final Year Project
  18. 18
  19. 19

    Auditory Evoked Potentials (AEPs) Response Classification: A Fast Fourier Transform (FFT) and Support Vector Machine (SVM) Approach by Islam, Md Nahidul, Norizam, Sulaiman, Rashid, Mamunur, Mahfuzah, Mustafa, Md Jahid, Hasan

    Published 2022
    “…Then, the features have extracted with the help of Fast Fourier Transform (FFT), Power Spectral Density (PSD), Spectral Centroids, Standard Deviation algorithms. To classify the extracted features, the Support Vector Machine (SVM) approach using Radial Basis Kernel Function (RBF) has been used. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item