Search Results - (( using rectification using algorithm ) OR ( java identification system algorithm ))

Refine Results
  1. 1

    Face recognition and identification system (FaceRec) / Khew Jye Huei by Khew , Jye Huei

    Published 2004
    “…It describes the implementation and functions of a working system that performs the recognition and identification of human faces using the implement algorithms. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The correctness of the proposed protocol is demonstrated in a simulation model developed in JAVA TCP/IP socket. Next, the proposed protocol is implemented in RFID system including IAIK UHF Demo tag, TagSense Nano-UHF reader and back-end database. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Investigation And Development Of Flattening Algorithms For Curved Latent Fingerprint Images by Chong, Bei Wei

    Published 2015
    “…Boundary of interested area can be acquired using a predefined algorithm or define by user using interactive drawing. …”
    Get full text
    Get full text
    Thesis
  6. 6

    OPTIMAL DESIGN AND ANALYSIS OF A DC–DC SYNCHRONOUS CONVERTER USING GENETIC ALGORITHM AND SIMULATED ANNEALING by K., S. Rama Rao., C. , -K, Chew

    Published 2009
    “…Abstract This paper presents the application of Genetic Algorithm (GA) and Simulated Annealing (SA) techniques for optimal design and analysis of a DC–DC converter with synchronous rectification normally used in battery charge/discharge circuits in DC uninterruptible power supply systems. …”
    Get full text
    Get full text
    Citation Index Journal
  7. 7

    OPTIMAL DESIGN AND ANALYSIS OF A DC–DC SYNCHRONOUS CONVERTER USING GENETIC ALGORITHM AND SIMULATED ANNEALING by K.S., Rama Rao, C. K., Chew

    Published 2009
    “…This paper presents the application of Genetic Algorithm (GA) and Simulated Annealing (SA) techniques for optimal design and analysis of a DC–DC converter with synchronous rectification normally used in battery charge/discharge circuits in DC uninterruptible power supply systems. …”
    Get full text
    Get full text
    Citation Index Journal
  8. 8

    A Practical Method for Camera Calibration in Stereo Vision Mobile Robot Navigation by Hamzah, Rostam Affendi, Abd Ghani, SHAMSUL FAKHAR, Kadmin, AHMAD FAUZAN, A Aziz, Khairul Azha

    Published 2012
    “…The algorithm uses Sum of Absolute Differences (SAD) which is developed using Matlab software.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    A Pixel to Pixel Correspondence and Region of Interest in Stereo Vision Application by Hamzah, Rostam Affendi, A Aziz, Khairul Azha, M Shokri, Ahmad Sayuthi

    Published 2012
    “…The algorithm uses Sum of Absolute Differences (SAD) which is developed using Matlab software. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Simulation and design of A DC-DC synchronous converter by intelligent optimization techniques by K., S. Rama Rao., Chew, Choon-keat

    Published 2010
    “…The design and analysis of the converter with the Genetic Algorithm are performed using software tools within the MATLAB/ SIMULINK environment. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    An Analysis Of Multiple Size Region Of Interest In Disparity Mapping For Stereo Vision Application by Hamzah, Rostam Affendi, Hamid, Mohd Saad, Rosly, Hasrul 'Nisham, Hashim, Nik Mohd Zarifie

    Published 2011
    “…The algorithm uses Sum of Absolute Differences (SAD) which is developed using Matlab software. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    An Agent-Based System with Personalization and Intelligent Assistance Services for Facilitating Knowledge Sharing by Mohd Sharef, Nurfadhlina

    Published 2006
    “…The proposed agent based system is called KSFaci (Knowledge Sharing Facilitator). …”
    Get full text
    Get full text
    Thesis
  13. 13

    A Pixel Matching Process And Multiples Roi For Stereo Images In Stereo Vision Application by Hamzah, Rostam Affendi, Salleh, Azahari, A Aziz, Khairul Azha, Mohammed Napiah, Zul Atfyi Fauzan

    Published 2011
    “…The algorithm uses Sum of Absolute Differences (SAD) which is developed using Matlab software. …”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14
  15. 15

    Biceps brachii surface EMG classification using neural networks by Chong, Yee Lin

    Published 2012
    “…The acquisition module is used to acquire EMG signals from the subject. Several signal processing methods are carried out in the preprocessing module, where the EMG signal will undergo a series of processes like filtering, rectification and integration. …”
    Get full text
    Thesis
  16. 16

    Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee by Por, Lip Yee

    Published 2012
    “…Two falsifying authentication methods using: (i) penup event and neighbouring connectivity manipulation; and (ii) partial password selection and metaheuristic randomisation algorithm methods, were proposed. The first and second proposed methods were incorporated into the proposed Background Pass-Go (BPG) system and Visual Identification Protocol Professional (VIP Pro) system respectively. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Online teleoperation of writing manipulator through graphics processing unit based accelerated stereo vision by Abu Raid, Fadi Imad Osman

    Published 2021
    “…The proposed algorithms aim to accelerate the processes of distortion removal and rectification using precomputed combined maps. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Investigation of impedance-based fault location techniques in power system network / Tan Feng Jie by Tan, Feng Jie

    Published 2019
    “…The estimated fault distances are evaluated using relative error based on total line length to determine the accuracy. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Safety Analysis Of Unsignalized Intersections Under Erroneous Road Crash Data Influence by Ahmed, Ashar

    Published 2016
    “…As a result of the rectification process, which involved the use of Nested Filtered Search Algorithm (NFSA) to match the accidents with the intersections where they might have occurred, 16 sites were correctly identified that initiated the second phase of the study. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC by Ismail, Haqi Khalid

    Published 2021
    “…To prove that the proposed design is suitable for IIoT, a new scheme is proposed namely a secure, efficient, and lightweight multi-factor authentication scheme for cross-domain IIoT systems (SELAMAT). In addition, a proof of concept is constructed to validate the proposed multi-factor Kerberos authentication using Java programming language. …”
    Get full text
    Get full text
    Thesis