Search Results - (( using vectorization research algorithm ) OR ( java application system algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3
  4. 4

    Block based motion vector estimation using fuhs16 uhds16 and uhds8 algorithms for video sequence by S. S. S. , Ranjit

    Published 2011
    “…Based on the theoretical and fundamental research analysis the FUHS16 and UHDS16 algorithms using 16 × 16 block-based motion estimation formulations were developed. …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  5. 5

    Real-time algorithmic music composition application. by Yap, Alisa Yi Hui

    Published 2022
    “…In addition, the system also utilises JavaFx and jFugue for its graphical user interface and music programming respectively. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6

    Route Optimization System by Zulkifli, Abdul Hayy

    Published 2005
    “…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
    Get full text
    Get full text
    Final Year Project
  7. 7

    Enhanced ontology-based text classification algorithm for structurally organized documents by Oleiwi, Suha Sahib

    Published 2015
    “…The first and second algorithms namely Concept Feature Vector (CFV) and Structure Feature Vector (SFV), create feature vector to represent the document. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9
  10. 10
  11. 11

    Web Algorithm search engine based network modelling of Malaria Transmission by Eze, Monday Okpoto

    Published 2013
    “…Unfortunately, such a practice leads to waste of resources on the wrong places, while ignoring the areas of critical vector existence. This research formalizes a contact network using a number of attributes of the malaria vectors, the public places, and the human beings that affect malaria transmission. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework by Asaad Aref, Ibrahim

    Published 2004
    “…Java Media Framework library and the RTP protocol for audio transmission were used as development tools.The developed system designed in this thesis together with experimental results proved that the system could be implemented successfully. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Mobile robot path optimization algorithm using vector calculus and mapping of 2 dimensional space by Zahari, Ammar, Ismail , Amelia Ritahani, Desia, Recky

    Published 2015
    “…This research explores path integration in mobile robot navigation and path optimization technique using vector calculus. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Abnormalities and fraud electric meter detection using hybrid support vector machine & genetic algorithm by Yap K.S., Abidin I.Z., Ahmad A.R., Hussien Z.F., Pok H.L., Ismail F.I., Mohamad A.M.

    Published 2023
    “…This paper presents an intelligent system to reduce Non Technical Loss (NTL) using hybrid Support Vector Machine (SVM) and Genetic Algorithm (GA). …”
    Conference Paper
  15. 15

    Improved nu-support vector regression algorithm based on principal component analysis by Abdullah Mohammed, Rashid, Habshah, Midi

    Published 2023
    “…However, outliers have an adverse effect on the PCA, and hence reduce the accuracy of the prediction model. To date, no research has been done to incorporate the PCA into the algorithm of support vector regression (SVR) technique in order to obtain an accurate prediction model with high accuracy. …”
    Get full text
    Get full text
    Article
  16. 16

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17
  18. 18
  19. 19
  20. 20

    Network game (Literati) / Chung Mei Kuen by Chung, Mei Kuen

    Published 2003
    “…The possible applications of multimedia-networked system are endless, as the demand to support interactive communication among groups of users has increased significantly. …”
    Get full text
    Get full text
    Thesis