Search Results - (( java implementation using algorithm ) OR ( features detection path algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    Provider independent cryptographic tools by Ibrahim, Subariah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
    Get full text
    Get full text
    Get full text
    Monograph
  3. 3

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Performance evaluation of real-time multiprocessor scheduling algorithms by Alhussian, H., Zakaria, N., Abdulkadir, S.J., Fageeri, S.O.

    Published 2016
    “…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    A YOLO-based deep learning model for Real-Time face mask detection via drone surveillance in public spaces by A. Mostafa, Salama, Ravi, Sharran, Zebari, Dilovan Asaad, Zebari, Nechirvan Asaad, Mohammed, Mazin Abed, Nedoma, Jan, Martinek, Radek, Deveci, Muhammet, Ding, Weiping

    Published 2024
    “…The feature enhancement task is performed by applying the Path Aggregation Network (PANet) and Spatial Pyramid Pooling Network (SPPNet) algorithms, which are deployed to enhance the extracted and generated features. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Automatic Number Plate Recognition on android platform: With some Java code excerpts by ., Abdul Mutholib, Gunawan, Teddy Surya, Kartiwi, Mira

    Published 2016
    “…On the other hand, the traditional algorithm using template matching only obtained 83.65% recognition rate with 0.97 second processing time. …”
    Get full text
    Get full text
    Get full text
    Book
  9. 9

    Obstacle detection technique using multi sensor integration for small unmanned aerial vehicle by Ramli, Muhammad Faiz, Shamsudin, Syariful Syafiq, Legowo, Ari

    Published 2017
    “…Finally, safe avoidance path for UAV is determined through the exterior feature points from the estimated width of the obstacle. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework by Asaad Aref, Ibrahim

    Published 2004
    “…Java Media Framework library and the RTP protocol for audio transmission were used as development tools.The developed system designed in this thesis together with experimental results proved that the system could be implemented successfully. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Safe avoidance region detection for unmanned aerial vehicle using cues from expansion of feature points by Ramli, Muhammad Faiz, Sutjipto, Agus G.E., Sulaeman, Erwin, Ari Legowo, Ari Legowo

    Published 2024
    “…A robust system should be able to not only detect obstacles but the free region for the avoidance path as well. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Classification Analysis Of High Frequency Stress Wave For Autonomous Detection Of Defect In Steel Tubes by Abd Halim, Zakiah, Jamaludin, Nordin, Junaidi, Syarif, Syed Yahya, Syed Yusaini

    Published 2014
    “…Interpretation of propagated high frequency stress wave signals in steel tubes is noteworthy for defect identification.This paper demonstrated a successful new approach for autonomous defect detection in steel tubes using classification analysis of high frequency stress waves.Classification analysis using Principal Component Analysis (PCA) algorithm involved feature extraction to reduce the dimensionality of the complex stress waves propagation path.Two defective tubes containing a slot defect of different orientation and a reference tube are inspected using Vibration Impact Acoustic Emission (VIAE) technique.The tubes are externally excited using impact hammer.The variation of stress wave transmission path are captured by high frequency Acoustic Emission sensor.The propagated stress waves in the steel tubes are classified using PCA algorithm.Classification results are graphically illustrated using a dendrogram that demonstrated the arrangement of the natural clusters of the stress wave signals.The inspection of steel tubes showed good recognition of defect in circumferential and longitudinal orientation.This approach successfully classified stress wave signals from VIAE testing and provide fast and accurate defect identification of defective steel tubes from non-defective tubes. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Animal voice recognition for identification (ID) detection system by Yeo, Che Yong, Syed Mohamed, Syed Abdul Rahman Al-Haddad, Ng, Chee Kyun

    Published 2011
    “…In this paper, an animal identification (ID) detection system based on animal voice pattern recognition algorithm has been developed. …”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Dog voice identification (ID) for detection system by Yeo, Che Yong, Syed Mohamed, Syed Abdul Rahman Al-Haddad, Ng, Chee Kyun

    Published 2012
    “…In this paper, an animal identification (ID) detection system based on animal voice pattern recognition algorithm has been developed. …”
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Café Web Based System Using Priority Scheduling Approach by Fatimah, Ghazali, Rohana, Ismail, Mohamad Hariz, Hasni

    Published 2017
    “…The system is implemented at UniSZA’s café where two different types of user will use the system. …”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    A Toolkit for Simulation of Desktop Grid Environment by FOROUSHAN, PAYAM CHINI

    Published 2014
    “…A simulator for desktop grid environment has been developed using Java as the implementation language due to its wide popularity. …”
    Get full text
    Get full text
    Final Year Project
  17. 17
  18. 18

    Machine Learning Based Detection for Compromised Accounts on Social Media Networks by K., Swapna, M., Rithika, K., Rukmini, S., Swachitha, Y., Komali

    Published 2025
    “…We employ machine learning algorithms to train models that can accurately classify accounts as compromised or legitimate based on these features. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Obstacle detection for Unmanned Aerial Vehicle (UAV) by Abdul Khaliq, Nor Aizatul Nabila, Ramli, Muhammad Faiz

    Published 2022
    “…This study aims to develop an obstacle detection system for unmanned aerial vehicles utilising the ORB feature extraction. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter by Azhar, Nur Huwaina

    Published 2019
    “…Cloudsim is used as Discrete Event Simulation tool and Java as coding language to evaluate LACE algorithm. …”
    Get full text
    Get full text
    Thesis