Search Results - (( using rectification using algorithm ) OR ( java applications out algorithm ))

Refine Results
  1. 1
  2. 2

    Real-Time Video Processing Using Native Programming on Android Platform by Saipullah, Khairul Muzzammil

    Published 2012
    “…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Investigation And Development Of Flattening Algorithms For Curved Latent Fingerprint Images by Chong, Bei Wei

    Published 2015
    “…Boundary of interested area can be acquired using a predefined algorithm or define by user using interactive drawing. …”
    Get full text
    Get full text
    Thesis
  4. 4

    OPTIMAL DESIGN AND ANALYSIS OF A DC–DC SYNCHRONOUS CONVERTER USING GENETIC ALGORITHM AND SIMULATED ANNEALING by K., S. Rama Rao., C. , -K, Chew

    Published 2009
    “…Abstract This paper presents the application of Genetic Algorithm (GA) and Simulated Annealing (SA) techniques for optimal design and analysis of a DC–DC converter with synchronous rectification normally used in battery charge/discharge circuits in DC uninterruptible power supply systems. …”
    Get full text
    Get full text
    Citation Index Journal
  5. 5

    OPTIMAL DESIGN AND ANALYSIS OF A DC–DC SYNCHRONOUS CONVERTER USING GENETIC ALGORITHM AND SIMULATED ANNEALING by K.S., Rama Rao, C. K., Chew

    Published 2009
    “…This paper presents the application of Genetic Algorithm (GA) and Simulated Annealing (SA) techniques for optimal design and analysis of a DC–DC converter with synchronous rectification normally used in battery charge/discharge circuits in DC uninterruptible power supply systems. …”
    Get full text
    Get full text
    Citation Index Journal
  6. 6
  7. 7

    A Practical Method for Camera Calibration in Stereo Vision Mobile Robot Navigation by Hamzah, Rostam Affendi, Abd Ghani, SHAMSUL FAKHAR, Kadmin, AHMAD FAUZAN, A Aziz, Khairul Azha

    Published 2012
    “…The algorithm uses Sum of Absolute Differences (SAD) which is developed using Matlab software.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    A Pixel to Pixel Correspondence and Region of Interest in Stereo Vision Application by Hamzah, Rostam Affendi, A Aziz, Khairul Azha, M Shokri, Ahmad Sayuthi

    Published 2012
    “…The algorithm uses Sum of Absolute Differences (SAD) which is developed using Matlab software. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…The project was planned using the Kanban development methodology, and was built using HTML, CSS, JavaScript, Django, NumPy and pandas. The completed web application is then hosted on Heroku. k-luster allows users to upload their own data set, or choose from one of three samples if they just want to try out the application. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  10. 10

    Simulation and design of A DC-DC synchronous converter by intelligent optimization techniques by K., S. Rama Rao., Chew, Choon-keat

    Published 2010
    “…The design and analysis of the converter with the Genetic Algorithm are performed using software tools within the MATLAB/ SIMULINK environment. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Smart appointment organizer for mobile application / Mohd Syafiq Adam by Adam, Mohd Syafiq

    Published 2009
    “…In creating this application, NetBeans IDE 6.5and Java Micro Edition (Java ME) are used. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…However, the increased security breaches of recent mental health applications that leaked the patient's profile. This project proposed a virtual mental health mobile application, called TalkOut, with a lightweight message encryption algorithm to protect patient's profile, conversation messages and treatment history. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  13. 13

    An Analysis Of Multiple Size Region Of Interest In Disparity Mapping For Stereo Vision Application by Hamzah, Rostam Affendi, Hamid, Mohd Saad, Rosly, Hasrul 'Nisham, Hashim, Nik Mohd Zarifie

    Published 2011
    “…The algorithm uses Sum of Absolute Differences (SAD) which is developed using Matlab software. …”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    A Pixel Matching Process And Multiples Roi For Stereo Images In Stereo Vision Application by Hamzah, Rostam Affendi, Salleh, Azahari, A Aziz, Khairul Azha, Mohammed Napiah, Zul Atfyi Fauzan

    Published 2011
    “…The algorithm uses Sum of Absolute Differences (SAD) which is developed using Matlab software. …”
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15
  16. 16

    Biceps brachii surface EMG classification using neural networks by Chong, Yee Lin

    Published 2012
    “…The acquisition module is used to acquire EMG signals from the subject. Several signal processing methods are carried out in the preprocessing module, where the EMG signal will undergo a series of processes like filtering, rectification and integration. …”
    Get full text
    Thesis
  17. 17

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Signatory however use a special Digital Signature Application which store the secret private key. The application was programmed by JAVA FX. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Face recognition and identification system (FaceRec) / Khew Jye Huei by Khew , Jye Huei

    Published 2004
    “…Face recognition is a technique to identify an individual by his/her physical characteristic and has been of interest to a growing number of researchers due to its applications on security. Several different algorithms have been proposed for computer recognition of human faces. …”
    Get full text
    Get full text
    Thesis
  20. 20