Search Results - (( java application system algorithm ) OR ( changes detection method algorithm ))

Refine Results
  1. 1

    Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography by Naji, Ahmed Wathik, Zaidan, B.B., Hameed, Shihab A., O-Khalifa, Othman

    Published 2009
    “…The strength of the information hiding science is due to the non-existence of standard algorithms to be used in hiding secret messages. Also there is randomness in hiding methods such as combining several media (covers) with different methods to pass a secret message. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2
  3. 3
  4. 4
  5. 5

    Amplitude independent versus amplitude dependent muscle activity detection algorithms: a comparative study by Khalid Hameed, Husamuldeen, Wan Hasan, Wan Zuha, Shafie, Suhaidi, Ahmad, Siti Anom, Jaafar, Haslina

    Published 2020
    “…Moreover, the sEMG signal amplitude is not constant during the recording time due to the variation in the characteristics of the electrode-skin interface and due to the changes in the ground reference level. Therefore, the performance of the muscle activity detection algorithms should not be affected by the involuntary amplitude variations of the sEMG signal in order to achieve reliable control of robotic devices intended for disabled people.To accentuate the importance of the amplitude independent muscle activity detection methods over the amplitude dependent detection methods, a comparative study has been conducted in this paper between the performance of an amplitude independent muscle activity detection algorithm (FLA-MSE algorithm) and three amplitude dependent algorithms with respect to the detection capability of weak muscle activities and with respect to the immunity against false alarms. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Application of weighted average on modal parameters for damage detection algorithms: Case study on steel beam by Fayyadh, M.M., Abdul Razak, H.

    Published 2011
    “…This study verifies the use of the proposed weighting method by Fayyadh and Abdul Razak (2011a) for damage detection algorithms applied on cracked steel beam. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Real-time algorithmic music composition application. by Yap, Alisa Yi Hui

    Published 2022
    “…In addition, the system also utilises JavaFx and jFugue for its graphical user interface and music programming respectively. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  8. 8

    Route Optimization System by Zulkifli, Abdul Hayy

    Published 2005
    “…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
    Get full text
    Get full text
    Final Year Project
  9. 9
  10. 10
  11. 11

    Utilization of canny and velocity bunching algorithms for modelling shoreline change by Marghany, Maged, Hashim, Mazlan

    Published 2006
    “…Edge detection algorithm such as Canny algorithm is implemented to identify shoreline. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12
  13. 13

    Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework by Asaad Aref, Ibrahim

    Published 2004
    “…Java Media Framework library and the RTP protocol for audio transmission were used as development tools.The developed system designed in this thesis together with experimental results proved that the system could be implemented successfully. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Weighting method for modal parameter based damage detection algorithms by Fayyadh, M.M., Abdul Razak, H.

    Published 2011
    “…This study proposes weighting method for damage detection algorithms based on the bending mode shapes for beam structures. …”
    Get full text
    Get full text
    Article
  15. 15

    The multiple outliers detection for circular univariate data using different agglomerative clustering algorithms by Nur Syahirah, Zulkipli, Siti Zanariah, Satari, Wan Nur Syahidah, Wan Yusoff

    Published 2024
    “…It has been found that SL-Chang, CL-Chang and AL-Chang algorithms work the best in detecting outliers with low masking and swamping effect when sample size is small for any percentage of outliers and concentration parameter. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Performance Comparison between RGB and HSV Color Segmentations for Road Sign Detection by Mohd Ali, Nursabillilah

    Published 2013
    “…This paper compares the performance of RGB and HSV color segmentations method in road signs detection. The road signs images are taken under various illumination changes, partial occlusion and rotational changes. …”
    Get full text
    Get full text
    Article
  17. 17

    Performance comparison between RGB and HSV color segmentations for road signs detection by Mohd Ali, Nursabillilah, Mohd Mustafah, Yasir, Alang Md Rashid, Nahrul Khair

    Published 2013
    “…This paper compares the performance of RGB and HSV color segmentations method in road signs detection. The road signs images are taken under various illumination changes, partial occlusion and rotational changes. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18
  19. 19

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20