Search Results - (( module interactive between algorithm ) OR ( java application customization algorithm ))
Search alternatives:
- customization algorithm »
- interactive between »
- module interactive »
- between algorithm »
- java application »
-
1
Towards real-time visual biometric authentication using human face for healthcare telepresence mobile robots
Published 2016“…The modules are developed with different algorithm and tested individually to ensure the stability of the system. …”
Get full text
Get full text
Get full text
Article -
2
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
3
Wireless data gloves Malay sign language recognition system
Published 2007“…This paper describes the structure and algorithm of the whole Wireless Bluetooth Data Gloves Sign Language Recognition System, which is defined as a Human-Computer Interaction (HCI) system. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Classification of hand gestures from EMG signals / Diaa Albitar
Published 2022“…Surface EMG signals are used to detect hand gestures and signal them as input module in developing prosthetics for rehabilitation and human machine interaction. …”
Get full text
Get full text
Thesis -
5
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
A self‐configured link adaptation for green LTE downlink transmission
Published 2015“…Accordingly, a new mapping between channel quality indicator and modulation and coding scheme is proposed to address EE–SE trade‐off with the use of a multi‐criteria decision‐making technique. …”
Get full text
Get full text
Article -
7
Enhanced recognition methods for text and slider CAPTCHA vulnerability assessment
Published 2025“…To address the limitation of traditional color enhancement algorithms that lack adaptive learning capabilities, three types of Variation Color Shift (VCS) algorithms have also been proposed for data augmentation. …”
Get full text
Get full text
Thesis -
8
Runtime pluggable CPU scheduler for linux operating system
Published 2010“…It has been implemented in three layers, kernel, modules, and user interface layer, to simplify the framework development and maintenance as well as to maintain performance. …”
Get full text
Get full text
Thesis
