Search Results - (( java application using algorithm ) OR ( automatic identification issues algorithm ))

Refine Results
  1. 1

    Evolutionary Programming (EP) based technique for secure point identification with load shedding technique in power transmission / Abdul Rahman Minhat by Minhat, Abdul Rahman

    Published 2008
    “…The study was initiated by the development of new algorithm for automatic voltage stability assessment (AVSA). …”
    Get full text
    Get full text
    Thesis
  2. 2

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  3. 3
  4. 4
  5. 5

    Feature extraction using active appearance model algorithm with Bayesian classification approach by Nuruzzaman, Mohammad, Hussain, Azham, Mohamad Tahir, Hatim, Abu Seman, Mohamad Amir

    Published 2013
    “…It directed towards the illumination-invariant automatic recognition of faces and analysis to improve face verification and identification performance.To compare with other feature extraction at the end of the study, an evaluation has been done with an existing face recognition system using AAM algorithm. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Study Of Modified Training Algorithm For Optimized Convergence Speed Of Neural Network by Kang, Miew How

    Published 2016
    “…First proposed algorithm is the combination of momentum algorithm with adaptive learning rate (ALR) algorithm, and second proposed algorithm is the combination of momentum algorithm with automatic learning rate selection (ALRS) algorithm. …”
    Get full text
    Get full text
    Thesis
  7. 7

    A security payment model for financial payment using mykad by Ahmad Zahari, Nurul Huda

    Published 2011
    “…ARSA will automatically change its security algorithm based on times and attacks. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    RFID-enabled supply chain detection using clustering algorithms by Azahar, T.F., Mahinderjit-Singh, M., Hassan, R.

    Published 2015
    “…Hence, we applied cost algorithms to reduce false negative values.…”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Embedded automated vision for double parking identification system by Norasyikin, Fadilah, See, Yoon Soon, Nor Hadzfizah, Mohd Radi

    Published 2018
    “…A camera was utilized to acquire the image of a parking area, and the image was processed using Beaglebone Black processor. A computer vision algorithm was developed to process the image using background subtraction, region of interest identification, and color analysis. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Pipeline condition assessment by instantaneous frequency response over hydroinformatics based technique—An experimental and field analysis by Muhammad Hanafi, Yusop, Ghazali, M. F., Mohd Fadhlan, Mohd Yusof, Muhammad Aminuddin, Pi Remli

    Published 2021
    “…The results recommended NIKAZ as an automatic selector of IMF to increase the degree of automation of HHT technique, subsequently enhancing the detection and identification of water pipeline leakage.…”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Real-Time Video Processing Using Native Programming on Android Platform by Saipullah, Khairul Muzzammil

    Published 2012
    “…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13
  14. 14
  15. 15

    An Approach to Automatic Garbage Detection Framework Designing using CNN by Sharma, Akhilesh Kumar, Jain, Antima, Deevesh Chaudhary, Deevesh Chaudhary, Tiwari, Shamik, Mahdin, Hairulnizam, Baharum, Zirawani, Shaharudin, Shazlyn Milleana, Maskat, Ruhaila, Arshad, Mohammad Syafwan

    Published 2023
    “…This paper proposes a system for automatic detection of litter and garbage dumps in CCTV feeds with the help of deep learning implementations. …”
    Get full text
    Get full text
    Article
  16. 16
  17. 17

    Multi-sensor fusion based on multiple classifier systems for human activity identification by Nweke, Henry Friday, Teh, Ying Wah, Mujtaba, Ghulam, Alo, Uzoma Rita, Al-garadi, Mohammed Ali

    Published 2019
    “…The study proposes a multi-view ensemble algorithm to integrate predicted values of different motion sensors. …”
    Get full text
    Get full text
    Article
  18. 18

    Multi-sensor fusion and deep learning framework for automatic human activity detection and health monitoring using motion sensor data / Henry Friday Nweke by Henry Friday , Nweke

    Published 2019
    “…Third, to propose orientation invariant based deep spare autoencoder methods for automatic complex activity identification to minimize orientation inconsistencies and learn adequate data patterns. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Real-time algorithmic music composition application. by Yap, Alisa Yi Hui

    Published 2022
    “…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  20. 20

    Performance evaluation of real-time multiprocessor scheduling algorithms by Alhussian, H., Zakaria, N., Abdulkadir, S.J., Fageeri, S.O.

    Published 2016
    “…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
    Get full text
    Get full text
    Conference or Workshop Item