Search Results - (( problem points detection algorithm ) OR ( java application interface algorithm ))

Refine Results
  1. 1

    Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption by Yeo Zi Zian

    Published 2022
    “…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  2. 2

    The application of Hough Transform for corner detection by Jamaludin, Mohad Fuad

    Published 2006
    “…As simple lines can be expressed using only one parameter, Hough Transform can detect them quickly. Other edge detectors have some problems when marking edge points around corners. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Real-time algorithmic music composition application. by Yap, Alisa Yi Hui

    Published 2022
    “…In addition, the system also utilises JavaFx and jFugue for its graphical user interface and music programming respectively. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  4. 4

    Extremal region detection and selection with fuzzy encoding for food recognition by Razali @ Ghazali, Mohd Norhisham

    Published 2019
    “…The first algorithm locates interest points in food images using an MSER. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Application-Programming Interface (API) for Song Recognition Systems by Murtadha Arif Sahbudin, Chakib Chaouch, Salvatore Serrano

    Published 2024
    “…In addition the implementation is done by algorithm using Java’s programming language, executed through an application developed in the Android operating system. …”
    Article
  6. 6

    Improving performance of automated coronary arterial tree center-line extraction, stent localization and tracking by Boroujeni, Farsad Zamani

    Published 2012
    “…The first contribution is automatic detection of seed points which serve as a prerequisite step for centerline extraction algorithm. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Visdom: Smart guide robot for visually impaired people by Lee, Zhen Ting

    Published 2025
    “…The system architecture integrates ROS 2 on a Raspberry Pi, with TCP/IP connectivity enabling remote operation. An Android mobile application, developed using Java and the java.net.Socket library, provides an intuitive and accessible user interface for seamless interaction with the robot. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  8. 8
  9. 9
  10. 10
  11. 11

    Robust diagnostics and variable selection procedure based on modified reweighted fast consistent and high breakdown estimator for high dimensional data by Baba, Ishaq Abdullahi

    Published 2022
    “…It is incorporated in the robust Mahalanobis distance to detect the presence of high leverage points in a dataset. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework by Asaad Aref, Ibrahim

    Published 2004
    “…A design proposal was outlined to provide an adaptive client/server approach to stream audio contents using Real-Time Transport Protocol (RTP) involving architecture based on the Java Media Framework (JMF) Application Programmable Interfaces (API).RTP protocol is the Internet-standard protocol for the transport of real-time data, including audio and video and can be implemented by using Java Media Framework (JMF). …”
    Get full text
    Get full text
    Thesis
  13. 13

    Fraud detection in telecommunication industry using Gaussian mixed model by Mohd Yusoff, Mohd Izhan, Mohamed, Ibrahim, Abu Bakar, Mohd Rizam

    Published 2013
    “…In this article, we propose a new fraud detection algorithm using Gaussian mixed model (GMM), a probabilistic model successfully used in speech recognition problem. …”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14
  15. 15

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  16. 16
  17. 17

    Detection And Segmentation Of Mass Region In Mammogram Image by Ting, Shyue Siong

    Published 2014
    “…Initially, the Mean Median Intersection Point (MMIP) algorithm is proposed to obtain a point in the intensity histogram to be set as threshold value to segment the breast region and distinguish it from the background in the mammogram image. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Improved robust principal component analysis based on minimum regularized covariance determinant for the detection of high leverage points in high dimensional data by Habshah Midi, Jaaz Suhaiza, Mohd Aslam, Hani Syahida, Emi Amielda

    Published 2025
    “…This paper presents an extension work of robust principal component analysis (ROBPCA) denoted as IRPCA, to improve the accuracy of the detection of high leverage points (HLPs) in high dimensional data (HDD). …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Detecting indoor positioning of moving object using wifi triangulation algorithm for kid tracker application by Wan Nor Afiqah, Wan Othman

    Published 2016
    “…As a result, this application can detects real time kids‟ position with acceptable time but not in accuracy due to some signal problem of Wi-Fi access point.…”
    Get full text
    Get full text
    Undergraduates Project Papers
  20. 20

    Comparison of UAV flying height parameter for crack detection applications / Wan Nurdayini Batrisyia Wan Ghazali by Wan Ghazali, Wan Nurdayini Batrisyia

    Published 2024
    “…Aerial photographs were taken using UAV at various heights and the images were then rectified to get the orthoimages. Next, the DoG algorithm was applied for the detection of visible cracks, and the results were compared with manually outlined cracks to determine the degree of the algorithm’s credibility. …”
    Get full text
    Get full text
    Student Project