Search Results - (( structures detector detection algorithm ) OR ( java application using algorithm ))

Refine Results
  1. 1

    Enhancement of Space-Time Receiver Structure with Multiuser Detection for Wideband CDMA Communication Systems by Subramaniam, Jeevan Rao

    Published 2006
    “…Additionally, the space-time receiver structure is combined with multiuser detection to further enhance the system. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Edge detection of MRI images using artificial neural network by Gunawan, Teddy Surya, Kartiwi, Mira, Abdul Malik, Noreha

    Published 2017
    “…Discussion The proposed ANN based edge detection produce better image segmentation for MRI images compared to other traditional edge detection algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Development of a Raspberry Pi Drowsiness Detection System based on Histogram of Oriented Gradient (HOG) Algorithm and Eye Aspect Ratio (EAR) Formula by Francis Xavier, Sam Daniel

    Published 2020
    “…This is due to the systems’ high-power usage nature, usage of expensive technologies and difficulties in integrating the detection system into all vehicles’ system. Therefore, a Raspberry Pi drowsiness detection system based on Histogram of Oriented Gradient (HOG) algorithm and Eye Aspect Ratio (EAR) formula has been developed in this research. …”
    Get full text
    Get full text
    Final Year Project
  4. 4
  5. 5
  6. 6

    Hereditary ratio of adolescent to parent based on lips analysis using canny edge detection / Nor Shamimi Kharuddin by Kharuddin, Nor Shamimi

    Published 2010
    “…This process significantly reduces the amount of data in the image, while preserving the most important structural features of that image. Canny edge detection is considered to be the ideal edge detection algorithm for images that are corrupted with white noise. …”
    Get full text
    Get full text
    Thesis
  7. 7

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  8. 8
  9. 9
  10. 10
  11. 11

    Hereditary traits based on lips analysis using Ellipse Fitting / Tantty Roshaida Rozaini by Rozaini, Tantty Roshaida

    Published 2010
    “…This process significantly reduces the amount of data in the image, while preserving the most important structural features of that image. Ellipse Fitting is considered to be the ideal edge detection algorithm for images that are corrupted with white noise. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Real-Time Video Processing Using Native Programming on Android Platform by Saipullah, Khairul Muzzammil

    Published 2012
    “…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13
  14. 14

    A tool for addressing construct identity in literature reviews and meta-analyses by Larsen, Kai Rune T., Bong, Chih How

    Published 2016
    “…All six designs were found capable of detecting construct identity, and a design combining two existing algorithms significantly outperformed the other approaches. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    A fuzzy approach for early human action detection / Ekta Vats by Ekta, Vats

    Published 2016
    “…Most existing methods deal with the detection of an action after its completion. Contrarily, for early detection it is essential to detect an action as early as possible. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Human detection and tracking with YOLO and SORT tracking algorithm by Kader, Tanveer, Ahmad Fakhri, Ab Nasir, Muhammad Zulfahmi, Toh Abdullah@ Toh Chin Lai, Muhammad Nur Aiman, Shapiee, Amir Fakarullsroq, Abdul Razak

    Published 2025
    “…This paper performs human tracking on videos recorded manually using optimized detectors following the tracking by detection framework. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Real-time algorithmic music composition application. by Yap, Alisa Yi Hui

    Published 2022
    “…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  18. 18

    A detailed description on unsupervised heterogeneous anomaly based intrusion detection framework by Udzir, Nur Izura, Hajamydeen, Asif Iqbal

    Published 2019
    “…Observing network traffic flow for anomalies is a common method in Intrusion Detection. More effort has been taken in utilizing the data mining and machine learning algorithms to construct anomaly based intrusion detection systems, but the dependency on the learned models that were built based on earlier network behaviour still exists, which restricts those methods in detecting new or unknown intrusions. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Performance evaluation of real-time multiprocessor scheduling algorithms by Alhussian, H., Zakaria, N., Abdulkadir, S.J., Fageeri, S.O.

    Published 2016
    “…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20