Search Results - (( java application server algorithm ) OR ( using recognition techniques algorithm ))

Refine Results
  1. 1

    Network game (Literati) / Chung Mei Kuen by Chung, Mei Kuen

    Published 2003
    “…Java applet is a well-known and widely used example of mobile code (a variation on the traditional client-server model). …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Computer remote monitoring via mobile phones using socket programming / Samih Omer Fadlelmola Elkhider by Omer Fadlelmola Elkhider, Samih

    Published 2011
    “…The studies show beyond technical algorithms, physical aspects plays a big rule in client server model. …”
    Get full text
    Get full text
    Thesis
  5. 5

    A Comparison Study On Pca_Modular Pca And Lda For Face Recognition by Cheah, Boon Wah

    Published 2017
    “…The performance of these face recognition algorithms will be evaluated by 10-fold cross validation using ORL database. …”
    Get full text
    Get full text
    Monograph
  6. 6

    Shape-based recognition using combined Jaccard and Mahalanobis measurement / Noor Aznimah Abdul Aziz by Abdul Aziz, Noor Aznimah

    Published 2013
    “…Therefore, we proposed a shape recognition algorithm using similarity measurement combining Jaccard and Mahalanobis distance is used to measure the similarity between geometry shape sketches. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Facial features point localization using modified SIFT scale space / Zulfikri Paidi by Paidi, Zulfikri

    Published 2020
    “…This study aimed to develop a new algorithm in the form of hybrids when the scaling technique in SIFT was integrated with another technique. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Iris Recognition As Biometric Authentication by Kamaruddin, Muhammad Khairulsyamim

    Published 2016
    “…In this project, an iris recognition technique based on the John Daugman’s algorithm is used. …”
    Get full text
    Get full text
    Final Year Project
  9. 9

    Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework by Asaad Aref, Ibrahim

    Published 2004
    “…A design proposal was outlined to provide an adaptive client/server approach to stream audio contents using Real-Time Transport Protocol (RTP) involving architecture based on the Java Media Framework (JMF) Application Programmable Interfaces (API).RTP protocol is the Internet-standard protocol for the transport of real-time data, including audio and video and can be implemented by using Java Media Framework (JMF). …”
    Get full text
    Get full text
    Thesis
  10. 10

    Optical character recognition for Quranic image similarity matching by Alotaibi, Faiz, Abdullah, Muhamad Taufik, Abdullah, Rusli, O. K. Rahmat, Rahmita Wirza, Hashem, Ibrahim Abaker Targio, Sangaiah, Arun Kumar

    Published 2017
    “…This method is based on a combination of Quranic diacritic and character recognition techniques. Diacritic detections are performed using a region-based algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    Quranic diacritic and character segmentation and recognition using flood fill and k-nearest neighbors algorithm by Alotaibi, Faiz E A L

    Published 2019
    “…A distinctive type of OCR is used to process Arabic characters, namely, Arabic Optical Character Recognition (AOCR). …”
    Get full text
    Get full text
    Thesis
  13. 13

    Car plate recognition system : (segmentation) by Nor Helmy Effendy, Meon

    Published 2005
    “…In the research,One Pass Thinning algorithm and Partial Segmentation algorithm are the algorithms being applied.For each phase,the used technique produces quite a good result whereby it is to be discussed in detail in the thesis.…”
    Get full text
    Get full text
    Undergraduates Project Papers
  14. 14

    Old Jawi manuscript: Digital recognition / Zaidi Razak by Zaidi, Razak

    Published 2016
    “…The evaluation results show that the proposed approach outperforms the algorithms of other recognition methods used for comparison. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…On the basis of the results of this research, it can be concluded that the developed prototype had high accuracy and security when transferring the file between the sender and receiver that was implemented in client-server application. This research hopes to give a clear idea to the readers about ABS algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  17. 17

    Arabic words recognition technique for pattern matching using SIFT, SURF and ORB by Mohd Zailani, Syarah Munirah, Morshidi, Malik Arman, Mohd Esa, Luqman Naim

    Published 2017
    “…A parameters estimator of models algorithm is used to weed out the outlier point of matching images. …”
    Get full text
    Get full text
    Article
  18. 18

    Classification System for Heart Disease Using Bayesian Classifier by Magendram, Anusha

    Published 2007
    “…This system was mainly developing using java programming. Apache Tom cat was used as a server in order to run the application smoothly. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Application Of Multi-Layer Perceptron Technique To Detect And Locate The Base Of A Young Corn Plant by Morshidi, Malik Arman

    Published 2007
    “…Multi-layer perceptron (MLP) neural network trained using backpropagation algorithm is used to segment the color image. …”
    Get full text
    Get full text
    Thesis
  20. 20

    The fusion of edge detection and mathematical morphology algorithm for shape boundary recognition by Othman, Mahmod, Syed Abdullah, Sharifah Lailee, Ahmad, Khairul Adilah, Abu Bakar, Mohd Nazari, Mansor, Ab Razak

    Published 2016
    “…Edge detection algorithm is used to simplify image data by minimizing the amount of pixel to be processed, whereas the mathematical morphology is used for smoothing effects and localizing the object shape using mathematical theory sets.The discussion section focuses on the improved edge map and boundary morphology (EmaBm) algorithm as a new technique for shape boundary recognition.A comparative analysis of various edge detection algorithms is presented.It reveals that the LoG’s edge detection embedded in EmaBM algorithm performs better than the other edge detection algorithms for fruit shape boundary recognition. …”
    Get full text
    Get full text
    Get full text
    Article