Search Results - (( structures detector detection algorithm ) OR ( java application using algorithm ))
Search alternatives:
- java application »
- using algorithm »
- structures »
- detector »
-
1
Enhancement of Space-Time Receiver Structure with Multiuser Detection for Wideband CDMA Communication Systems
Published 2006“…Additionally, the space-time receiver structure is combined with multiuser detection to further enhance the system. …”
Get full text
Get full text
Thesis -
2
Edge detection of MRI images using artificial neural network
Published 2017“…Discussion The proposed ANN based edge detection produce better image segmentation for MRI images compared to other traditional edge detection algorithms. …”
Get full text
Get full text
Get full text
Get full text
Article -
3
Development of a Raspberry Pi Drowsiness Detection System based on Histogram of Oriented Gradient (HOG) Algorithm and Eye Aspect Ratio (EAR) Formula
Published 2020“…This is due to the systems’ high-power usage nature, usage of expensive technologies and difficulties in integrating the detection system into all vehicles’ system. Therefore, a Raspberry Pi drowsiness detection system based on Histogram of Oriented Gradient (HOG) algorithm and Eye Aspect Ratio (EAR) formula has been developed in this research. …”
Get full text
Get full text
Final Year Project -
4
-
5
-
6
Hereditary ratio of adolescent to parent based on lips analysis using canny edge detection / Nor Shamimi Kharuddin
Published 2010“…This process significantly reduces the amount of data in the image, while preserving the most important structural features of that image. Canny edge detection is considered to be the ideal edge detection algorithm for images that are corrupted with white noise. …”
Get full text
Get full text
Thesis -
7
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
8
-
9
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
10
A Comparative Analysis of Feature Extraction Algorithms for Augmented Reality Applications
Published 2021“…The quantitative results show that the ORB and SURF algorithms detect and match more features than other algorithms. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
11
Hereditary traits based on lips analysis using Ellipse Fitting / Tantty Roshaida Rozaini
Published 2010“…This process significantly reduces the amount of data in the image, while preserving the most important structural features of that image. Ellipse Fitting is considered to be the ideal edge detection algorithm for images that are corrupted with white noise. …”
Get full text
Get full text
Thesis -
12
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
14
A tool for addressing construct identity in literature reviews and meta-analyses
Published 2016“…All six designs were found capable of detecting construct identity, and a design combining two existing algorithms significantly outperformed the other approaches. …”
Get full text
Get full text
Get full text
Article -
15
A fuzzy approach for early human action detection / Ekta Vats
Published 2016“…Most existing methods deal with the detection of an action after its completion. Contrarily, for early detection it is essential to detect an action as early as possible. …”
Get full text
Get full text
Thesis -
16
Human detection and tracking with YOLO and SORT tracking algorithm
Published 2025“…This paper performs human tracking on videos recorded manually using optimized detectors following the tracking by detection framework. …”
Get full text
Get full text
Get full text
Article -
17
Real-time algorithmic music composition application.
Published 2022“…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
18
A detailed description on unsupervised heterogeneous anomaly based intrusion detection framework
Published 2019“…Observing network traffic flow for anomalies is a common method in Intrusion Detection. More effort has been taken in utilizing the data mining and machine learning algorithms to construct anomaly based intrusion detection systems, but the dependency on the learned models that were built based on earlier network behaviour still exists, which restricts those methods in detecting new or unknown intrusions. …”
Get full text
Get full text
Get full text
Article -
19
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
Get full text
Get full text
Conference or Workshop Item -
20
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item
