Search Results - (( java application interface algorithm ) OR ( key detection method algorithm ))

Refine Results
  1. 1

    Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption by Yeo Zi Zian

    Published 2022
    “…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  2. 2

    Real-time algorithmic music composition application. by Yap, Alisa Yi Hui

    Published 2022
    “…In addition, the system also utilises JavaFx and jFugue for its graphical user interface and music programming respectively. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  3. 3

    Application-Programming Interface (API) for Song Recognition Systems by Murtadha Arif Sahbudin, Chakib Chaouch, Salvatore Serrano

    Published 2024
    “…In addition the implementation is done by algorithm using Java’s programming language, executed through an application developed in the Android operating system. …”
    Article
  4. 4

    Modified Miller-Rabin primality test algorithm to detect prime numbers for generating RSA keys by Shereek, Balkees Mohamed

    Published 2016
    “…The Rivest-Shamir-Adleman algorithm (RSA) is one of the most well-known and strongest public key cryptography algorithms. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Visdom: Smart guide robot for visually impaired people by Lee, Zhen Ting

    Published 2025
    “…The system architecture integrates ROS 2 on a Raspberry Pi, with TCP/IP connectivity enabling remote operation. An Android mobile application, developed using Java and the java.net.Socket library, provides an intuitive and accessible user interface for seamless interaction with the robot. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6

    Visdom: Smart guide robot for visually impaired people by Lee, Zhen Ting

    Published 2025
    “…The system architecture integrates ROS 2 on a Raspberry Pi, with TCP/IP connectivity enabling remote operation. An Android mobile application, developed using Java and the java.net.Socket library, provides an intuitive and accessible user interface for seamless interaction with the robot. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  7. 7

    Multi-Phase Information Theory-Based Algorithm for Edge Detection of Aerial Images by Elaraby, Ahmed, Al-Ameen, Zohair

    Published 2022
    “…Such findings make the proposed algorithm desirable to be used as a key image detection method with other image-related applications.…”
    Get full text
    Get full text
    Article
  8. 8
  9. 9

    Improving the efficiency of clustering algorithm for duplicates detection by Emran, Nurul Akmar, Abdul Rahim, Abdulrazzak Ali Mohamed, Kamal Baharin, Safiza Suhana, Othman, Zahriah, Salem, Awsan Thabet, Abd Aziz, Maslita, Md. Bohari, Nor Mas Aina, Abdullah, Noraswaliza

    Published 2023
    “…Two datasets (compact disc database (CDDB) and MusicBrainz) were used to test duplicates detection algorithms. The duplicates detection toolkit(DuDe) was used as a benchmark for the proposed method. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework by Asaad Aref, Ibrahim

    Published 2004
    “…A design proposal was outlined to provide an adaptive client/server approach to stream audio contents using Real-Time Transport Protocol (RTP) involving architecture based on the Java Media Framework (JMF) Application Programmable Interfaces (API).RTP protocol is the Internet-standard protocol for the transport of real-time data, including audio and video and can be implemented by using Java Media Framework (JMF). …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  13. 13
  14. 14

    Cabbage disease detection system using k-NN algorithm by Mohamad Ainuddin Sahimat

    Published 2022
    “…Then, the segmented cabbage sample will use the GLCM method for feature extraction. It is a method of extracting second-order statistical texture features to detect diseases more efficiently. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  15. 15

    An Improved Action Key Frames Extraction Algorithm for Complex Colour Video Shot Summarization by Mizher, Manar Abduljabbar Ahmad, Ang, Mei Choo, Sheikh Abdullah, Siti Norul Huda, Kok, Weng Ng

    Published 2019
    “…The objective of this work is to improve our previous action key frames extraction algorithm (AKF) by adapting a threshold which selects action key frames as final key frames. …”
    Get full text
    Get full text
    Article
  16. 16

    Augmenting the Robustness and Efficiency of Violence Detection Systems for Surveillance and Non-Surveillance Scenarios by MUHAMMAD, SHOAIB, ASAD, ULLAH, Irshad, Ahmed Abbasi, Fahad, Algarni, Adnan Shahid, Khan

    Published 2022
    “…Our key contributions include the development of efficient keyframes selection methods and classification models, addressing the challenge of violence detection in dynamic surveillance scenarios. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    An enhanced binary bat and Markov clustering algorithms to improve event detection for heterogeneous news text documents by Al-Dyani, Wafa Zubair Abdullah

    Published 2022
    “…This work focuses on the FS problem by automatically detecting events through a novel wrapper FS method based on Adapted Binary Bat Algorithm (ABBA) and Adapted Markov Clustering Algorithm (AMCL), termed ABBA-AMCL. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Artificial neural networks and genetic algorithm for transformer winding/insulation faults by K.S.R., Rao, K.N., Nashruladin

    Published 2008
    “…Genetic Algorithm is used to derive the optimal key gas ratios to enhance the accuracy of fault detection. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Novel chewing cycle approach for peak detection algorithm of chew count estimation by Selamat, Nur Asmiza, Md Ali, Sawal Hamid, Ismail, Ahmad Ghadafi, Ahmad, Siti Anom, Minhad, Khairun Nisa'

    Published 2025
    “…The peak detection algorithm identifies key signal features, while PSO optimizes the peak prominence and width parameters to minimize the mean absolute error (MAE) in chew count estimation. …”
    Get full text
    Get full text
    Article
  20. 20

    Novel chewing cycle approach for peak detection algorithm of chew count estimation by Selamat, Nur Asmiza, Md Ali, Sawal Hamid, Ismail, Ahmad Ghadafi, Ahmad, Siti Anom, Minhad, Khairun Nisa’

    Published 2025
    “…The peak detection algorithm identifies key signal features, while PSO optimizes the peak prominence and width parameters to minimize the mean absolute error (MAE) in chew count estimation. …”
    Get full text
    Get full text
    Get full text
    Article