Search Results - (( java implication force algorithm ) OR ( software digitalization towards algorithm ))
Search alternatives:
- software digitalization »
- implication force »
- towards algorithm »
- java implication »
- force algorithm »
-
1
3D silhouette rendering algorithms using vectorisation technique from Kedah topography map
Published 2004“…Contour data from a topography map are convert from raster to vector (vectorisation) in order to create a grid terrain Digital Elevation Model (DEM) data. The vectorisation software has been used for producing these data. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
2
An efficient method for audio watermarking using SWT and mean value quantization
Published 2016“…Digital watermarking has been capturing the interests in programming society several decades ago due to the development of software and programming techniques that cause an increase in illegal use of digital files. …”
Get full text
Get full text
Thesis -
3
3D imaging techniques in documentation of cultural assets in Malaysia
Published 2015“…Shortage of expertise in many levels of digital practice and general perception that 3D digital documentation is costly and requiring high investments further hampers digitization efforts. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
Analytical simulation of non-linearity effects compensation in all-optical orthogonal frequency division multiplexing systems
Published 2020“…The digital processing of the detected signals and Bit Error Rate (BER) calculation are performed by using DSP algorithm in Matlab software. …”
Get full text
Get full text
Thesis -
5
3D documenatation of the petalaindera: Digital heritage preservation methods using 3D laser scanner and photogrammetry
Published 2018“…In recent years, however, the advent of computer vision (CV) algorithms make it possible to reconstruct 3D geometry of objects by using image sequences from digital cameras, which are then processed by web services and freeware applications. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
6
Input significance analysis: Feature selection through synaptic weights manipulation for EFuNNs classifier
Published 2017“…The data stored or collected from these digital activities can be so large or complex, and caused the traditional data processing algorithms or software to be inadequate when used to process them. …”
Get full text
Get full text
Get full text
Article -
7
3D documentation of the Petalaindera: digital heritage preservation methods using 3D laser scanner and photogrammetry
Published 2017“…In recent years, however, the advent of computer vision (CV) algorithms make it possible to reconstruct 3D geometry of objects by using image sequences from digital cameras, which are then processed by web services and freeware applications. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
8
3D documenatation of the petalaindera: Digital heritage preservation methods using 3D laser scanner and photogrammetry
Published 2018“…In recent years, however, the advent of computer vision (CV) algorithms make it possible to reconstruct 3D geometry of objects by using image sequences from digital cameras, which are then processed by web services and freeware applications. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
9
-
10
Collective behavior quantification on human odor effects against female Aedes aegypti mosquitoes—Open source development
Published 2017“…Entomologists have been progressing more toward using machine vision for efficiency for this endeavor. …”
Get full text
Get full text
Get full text
Article -
11
The influence of Robo-advisory services on Malaysia university student’s investment intention
Published 2025“…The emergence of robo-advisory services has transformed the landscape of investment by offering automated, algorithm-driven financial planning with minimal human intervention. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
12
Design and implementation of a private and public key crypto processor for next-generation it security applications
Published 2006“…The proposed embedded system is designed using SoC technology, with hardware described in VHDL and the embedded software coded in C. The resulting cryptohardware is implemented into a single Altera Stratix FPGA microchip. …”
Get full text
Get full text
Get full text
Article -
13
3D terrain visualisation for GIS: A comparison of different techniques
Published 2011“…Three different areas in the Universiti Putra Malaysia (UPM) were chosen for this experiment; grid Digital Elevation Model (DEM) generated from R2V software was used as topographic data and Quick Bird satellite image of UPM for satellite data. …”
Get full text
Get full text
Book Section -
14
