Search Results - (( points detection system algorithm ) OR ( java application using algorithm ))

Refine Results
  1. 1

    Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption by Yeo Zi Zian

    Published 2022
    “…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  2. 2

    An evolutionary harmony search algorithm with dominant point detection for recognition-based segmentation of online Arabic text recognition by Moayad, Yousif Potrus, Ngah, Umi Kalthum, Bestoun S. , Ahmed

    Published 2014
    “…At first, the pre-segmentation algorithm uses a modified dominant point detection algorithm to mark a minimal number of points which defines the text skeleton. …”
    Get full text
    Get full text
    Article
  3. 3

    Artificial immune system based on real valued negative selection algorithms for anomaly detection by Khairi, Rihab Salah

    Published 2015
    “…The Real-Valued Negative Selection Algorithms, which are the focal point of this research, generate their detector sets based on the points of self data. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Dual search maximum power point algorithm based on mathematical analysis under partially-shaded conditions by Hajighorbani, Shahrooz

    Published 2016
    “…Moreover, it is very important that the algorithms should be general and not so complicated which could be implemented for all systems.Therefore, this research presents design and development of a novel method, which is called dual search maximum power point (DSMPP) algorithm, for tracking the GMPP under PSCs. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Artificial intelligent integrated into sun-tracking system to enhance the accuracy, reliability and long-term performance in solar energy harnessing by Tan, Jun You

    Published 2022
    “…YOLOv7 is chosen as the object detection algorithm to detect sun, while Q-learning is chosen as the algorithm for reinforcement learning to control the motors. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  7. 7

    Improving performance of automated coronary arterial tree center-line extraction, stent localization and tracking by Boroujeni, Farsad Zamani

    Published 2012
    “…In this research work, we report on new contributions to the major parts of a computer assisted stent positioning system. The first contribution is automatic detection of seed points which serve as a prerequisite step for centerline extraction algorithm. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Pengesanan minutiae imej cap jari berskala kelabu menggunakan algoritma susuran batas by Sulong, Siti Masrina

    Published 2002
    “…Even though, Wse minutiae still detected during the process. Based on these errors, an improved Ridge Line Following Algorithm has developed which consist of five processes; tangent direction computation, sectioning and maximum determination, end point detection, bifurcation point detection, and post-processing. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    A Collision Detection Algorithm For Virtual Robot-Centered Flexible Manufacturing Cell by Arshad, Haslina

    Published 2008
    “…To verify the collision detection algorithm, it is tested with different positions and heights of the storage system during simulation of the virtual flexible manufacturing cell. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12
  13. 13
  14. 14

    Detecting indoor positioning of moving object using wifi triangulation algorithm for kid tracker application by Wan Nor Afiqah, Wan Othman

    Published 2016
    “…As a result, this application can detects real time kids‟ position with acceptable time but not in accuracy due to some signal problem of Wi-Fi access point.…”
    Get full text
    Get full text
    Undergraduates Project Papers
  15. 15

    The application of Hough Transform for corner detection by Jamaludin, Mohad Fuad

    Published 2006
    “…Mean while, the Zhang Suen Thinning Method can be used to reduce the edge points into minima points to speed up the algorithm. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20

    Weeds detection for agriculture using Convolutional Neural Network (CNN) algorithm / Khairun Nisa Mohammad Nasir by Mohammad Nasir, Khairun Nisa

    Published 2024
    “…Modern agriculture recognizes weed detection systems as crucial tools to reduce the obstacles caused by weeds, enhancing crop growth and yield. …”
    Get full text
    Get full text
    Thesis