Search Results - (( java implementation based algorithm ) OR ( program visualization sensor algorithm ))

Refine Results
  1. 1

    Optimizing Visual Surveillance Sensor Coverage Using Dynamic Programming by Altahir, A.A., Asirvadam, V.S., Hamid, N.H.B., Sebastian, P., Saad, N.B., Ibrahim, R.B., Dass, S.C.

    Published 2017
    “…The main contribution of the paper is to introduce a dynamic programming algorithm, which defines an optimal policy for solving the visual sensor coverage problem. …”
    Get full text
    Get full text
    Article
  2. 2

    Optimizing Visual Sensors Placement with Risk Maps Using Dynamic Programming by Altahir, A.A., Asirvadam, V.S., Sebastian, P., Hamid, N.H.B., Ahmed, E.F.

    Published 2022
    “…This article explores the efficiency of the visual sensor placement based on a combination of two methods namely, a deterministic risk estimation for the risk assessment and a dynamic programming for optimizing the placement of surveillance cameras. …”
    Get full text
    Get full text
    Article
  3. 3

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…Today, with online marketing, banking, healthcare and other services, even the average householder is aware of encryption. The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  4. 4

    Optimizing Visual Sensor Coverage Overlaps for Multiview Surveillance Systems by Altahir, A.A., Asirvadam, V.S., Hamid, N.H.B., Sebastian, P., Saad, N.B., Ibrahim, R.B., Dass, S.C.

    Published 2018
    “…This paper examines the coverage overlapping configurations in visual surveillance systems. This paper proposes a robust dynamic programming framework to optimize visual surveillance sensor coverage overlaps. …”
    Get full text
    Get full text
    Article
  5. 5

    Optimizing Visual Sensor Coverage Overlaps for Multiview Surveillance Systems by Altahir, A.A., Asirvadam, V.S., Hamid, N.H.B., Sebastian, P., Saad, N.B., Ibrahim, R.B., Dass, S.C.

    Published 2018
    “…This paper examines the coverage overlapping configurations in visual surveillance systems. This paper proposes a robust dynamic programming framework to optimize visual surveillance sensor coverage overlaps. …”
    Get full text
    Get full text
    Article
  6. 6

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Automatic Number Plate Recognition on android platform: With some Java code excerpts by ., Abdul Mutholib, Gunawan, Teddy Surya, Kartiwi, Mira

    Published 2016
    “…The main challenges of implementing ANPR algorithm on mobile phone are how to produce a higher coding efficiency, lower computational complexity, and higher scalability. …”
    Get full text
    Get full text
    Get full text
    Book
  8. 8

    Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework by Asaad Aref, Ibrahim

    Published 2004
    “…A design proposal was outlined to provide an adaptive client/server approach to stream audio contents using Real-Time Transport Protocol (RTP) involving architecture based on the Java Media Framework (JMF) Application Programmable Interfaces (API).RTP protocol is the Internet-standard protocol for the transport of real-time data, including audio and video and can be implemented by using Java Media Framework (JMF). …”
    Get full text
    Get full text
    Thesis
  9. 9

    Café Web Based System Using Priority Scheduling Approach by Fatimah, Ghazali, Rohana, Ismail, Mohamad Hariz, Hasni

    Published 2017
    “…The priority scheduling algorithm is based on Control Processing Unit scheduling algorithm where it has a priority to execute tasks. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Flow regime identification of particles conveying in pneumatic pipeline using electric charge tomography and neural network techniques by Ahmed Sabit, Hakilo

    Published 2006
    “…Data captured for this purpose is in the range of mass flow rates 26 g/s to 204 g/s. A Visual C++ programming language is used to develop an application program to compute the image reconstruction algorithms and display the tomograms which represent the concentration profiles at a measurement crosssection of the pipe. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Pairwise testing tools based on hill climbing algorithm (PTCA) by Lim, Seng Kee

    Published 2014
    “…The actual implementation of the algorithm which is in Java programming language, the program is implemented on Net Bean 7.0.1. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  12. 12

    Java based expert system for selection of natural fibre composite materials by Ahmed Ali, Basheer A., Salit, Mohd Sapuan, Zainudin, Edi Syams, Othman, Mohamed

    Published 2013
    “…In this paper, we develop a technology for the materials selection system using Java based expert system. The weighted-range method (WRM) was implemented to identify the range value and to scrutinise the candidate materials. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Solid/gas concentration measurements using multiple fan beam optical tomography by Abdul Rahim, R., Leong, L.C, Chan, K.S., Fazalul Rahiman, M. H., Fang, J.F.

    Published 2008
    “…The data obtained from optical fibre sensors will then be reconstructed into image using the Linear Back Projection and Iterative Reconstruction algorithms through Visual C++ programming. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    A Toolkit for Simulation of Desktop Grid Environment by FOROUSHAN, PAYAM CHINI

    Published 2014
    “…A simulator for desktop grid environment has been developed using Java as the implementation language due to its wide popularity. …”
    Get full text
    Get full text
    Final Year Project
  15. 15

    Implementation of multiple fan beam projection technique in optical fibre process tomography by Leong, Lai Chen

    Published 2005
    “…Data obtained from optical fibre sensors will then be reconstructed into image using the Linear Back Projection and Iterative Reconstruction algorithms through Visual C++ programming. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Application of genetic algorithm and JFugue in an evolutionary music generator by Tang, Jia Rou

    Published 2025
    “…This project explores the application of Genetic Algorithms (GA) with JFugue, which is a Java-based music programming library to develop an Evolutionary Music Generator. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  17. 17

    Optimization of blood vessel detection in retina images using multithreading and native code for portable devices by Tran, Duc Ngoc, Hussin, Fawnizu Azmadi, Yusoff, Mohd Zuki

    Published 2013
    “…In this paper, the blood vessel detection system is implemented and optimized in a portable device running Android OS on an ARM-based processor. …”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    An approach for cross-site scripting detection and removal based on genetic algorithms. by Hydara, Isatou, Md Sultan, Abu Bakar, Zulzalil, Hazura, Admodisastro, Novia

    Published 2014
    “…The proposed approach is, so far, only implemented and validated on Java-based Web applications, although it can be implemented in other programming languages with slight modifications. …”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Design Of Robot Motion Planning Algorithm For Wall Following Robot by Ali Hassan, Muhamad Khairul

    Published 2006
    “…Computer A will be sent the data to computer B through the internet/LAN using JAVA program. Computer B will send the data to the BASIC Stamp and the BASIC Stamp will check their program. …”
    Get full text
    Get full text
    Monograph
  20. 20

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item