Search Results - (( java application customization algorithm ) OR ( changes detection queue algorithm ))

  • Showing 1 - 6 results of 6
Refine Results
  1. 1

    A Study on Implementing Physiology-Based Approach and Optical Flow Algorithm to Thermal Screening System for Flu Detection by Kamarul Hawari, Ghazali, Norulzahrah, M. Zainudin, Suzaimah, Ramli, M. Lazim, Talib, Nor Asiakin, Hasbullah

    Published 2015
    “…However this approach is ineffective and this will lead to long queue in public. To solve this issue, we have proposed a combination of physiology-based and optical flow algorithm to extract vascular network from the face. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Safe avoidance region detection for unmanned aerial vehicle using cues from expansion of feature points by Ramli, Muhammad Faiz, Sutjipto, Agus G.E., Sulaeman, Erwin, Ari Legowo, Ari Legowo

    Published 2024
    “…A micro LIDAR sensor is used as the initial detector of obstacle and queue for image capturing by the camera. Next, ORB algorithm is applied to find the obstacle regions and free space regions. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    A hybrid rate control mechanism for forwarding and congestion control in named data network by Alsamman, Mohammed Gamal

    Published 2020
    “…Therefore, transport algorithms which use conventional paradigms would not work correctly in the NDN environment, since the content source location frequently changes. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Safe avoidance path detection using multi sensor integration for small unmanned aerial vehicle by Ramli, Muhammad Faiz, Shamsudin, Syariful Syafiq, Legowo, Ari

    Published 2018
    “…A small Lidar sensor is used as the initial detector of obstacle and queue for image capturing by the camera. Next, SURF algorithm is applied to find the obstacle regions and free space regions. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  5. 5

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item