Search Results - (( visualization implementing recognition algorithm ) OR ( java implementation using algorithm ))

Refine Results
  1. 1

    AMOR: an adaptive, multimodal architecture for visual object recognition by James Mountstephens

    Published 2014
    “…The specific objectives of this research were to design, implement and evaluate the proposed architecture. The architecture design was formalised mathematically and algorithmically in the form of "reclassification", implemented in custom Matlab code and evaluated by comparison to existing visual-only methods for object recognition. …”
    Get full text
    Get full text
    Research Report
  2. 2

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  3. 3

    Camera Independent Face Recognition Algorithm In Visual Surveillance by Yew, Chuu Tian

    Published 2015
    “…The experimental results demonstrate the performance of the proposed algorithm on Surveillance Camera Face Database (SCface) database with 97.45% average recognition rate. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Neural Network Based Pattern Recognition in Visual Inspection System for Intergrated Circuit Mark Inspection by Sevamalai, Venantius Kumar

    Published 1998
    “…A neural network based pattern recognition system was implemented and tested on images resembling the parts variations. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Fingerprint recognition using neural networks / Kennie Yeoh Eng Hoe by Kennie Yeoh , Eng Hoe

    Published 2001
    “…This paper studies the implementation of the Fast Fourier Transform and Artificial Neural Networks into the recognition of fingerprints. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Visual servo algorithm of robot arm for pick and place application by Chuah, Zuo Wei, Mohd Hairi Mohd Zaman, Mohd Faisal Ibrahim

    Published 2024
    “…First, an object recognition algorithm is implemented to identify the object to be grasped. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Provider independent cryptographic tools by Ibrahim, Subariah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
    Get full text
    Get full text
    Get full text
    Monograph
  8. 8

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Age And Gender Recognition Mobile App by Wee, Quo Lung

    Published 2023
    “…After reviewing existing age and gender recognition mobile app, Convolutional Neural Network (CNN), one of the deep learning algorithms is implement in this proposed system. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  11. 11
  12. 12

    Performance evaluation of real-time multiprocessor scheduling algorithms by Alhussian, H., Zakaria, N., Abdulkadir, S.J., Fageeri, S.O.

    Published 2016
    “…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Adopting morphology method in camera based EAN-13 1D barcode recognition using Simulink / Siti Nor Safinaz Ozaimidi by Ozaimidi, Siti Nor Safinaz

    Published 2012
    “…This paper studies barcode recognition which implements using Simulink MATLAB 7.13. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Automatic Number Plate Recognition on android platform: With some Java code excerpts by ., Abdul Mutholib, Gunawan, Teddy Surya, Kartiwi, Mira

    Published 2016
    “…On the other hand, the traditional algorithm using template matching only obtained 83.65% recognition rate with 0.97 second processing time. …”
    Get full text
    Get full text
    Get full text
    Book
  15. 15

    A robust illumination-invariant face recognition based on fusion of thermal IR, maximum filter and visible image by Rayner Pailus, Rayner Alfred

    Published 2020
    “…We are also implementing a hybrid method that combines the active approach by implementing thermal infrared imaging and also the passive approach of Maximum Filter and visual image. …”
    Get full text
    Get full text
    Article
  16. 16

    Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework by Asaad Aref, Ibrahim

    Published 2004
    “…Java Media Framework library and the RTP protocol for audio transmission were used as development tools.The developed system designed in this thesis together with experimental results proved that the system could be implemented successfully. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Detection of head position using chain code algorithm by Fuad, Norfaiza

    Published 2007
    “…The main contribution of this thesis is it contributes an algorithm of head recognition and detecting which based on image segmentation, Prewitt edge detection and Chain Code algorithm. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Detection of head position using chain code algorithm by Fuad, Norfaiza

    Published 2007
    “…The main contribution of this thesis is it contributes an algorithm of head recognition and detecting which based on image segmentation, Prewitt edge detection and Chain Code algorithm. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20