Search Results - (( work detection queue algorithm ) OR ( java application customization algorithm ))

  • Showing 1 - 6 results of 6
Refine Results
  1. 1

    Passenger Counting With Face Detection by Teoh, Han Wei

    Published 2020
    “…MobileNet-single shot detector (SSD) is chosen as the object detector model since it belongs to a class of efficient models that can execute on mobile and embedded systems. While running detections across every video frames, centroid tracking algorithm tracks every unique person in video streams, where Kalman filter is further applied to reduce the noise. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  2. 2

    Obstacle detection technique using multi sensor integration for small unmanned aerial vehicle by Ramli, Muhammad Faiz, Shamsudin, Syariful Syafiq, Legowo, Ari

    Published 2017
    “…Due to size and weight constraints, very limited detection sensors can be equipped in the system. Prior works focused on a single sensing device which is either camera or range sensors based. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    A hybrid rate control mechanism for forwarding and congestion control in named data network by Alsamman, Mohammed Gamal

    Published 2020
    “…Therefore, transport algorithms which use conventional paradigms would not work correctly in the NDN environment, since the content source location frequently changes. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Safe avoidance path detection using multi sensor integration for small unmanned aerial vehicle by Ramli, Muhammad Faiz, Shamsudin, Syariful Syafiq, Legowo, Ari

    Published 2018
    “…Due to size and weight constraints, very limited detection sensors can be equipped in the system. Prior works focused on a single sensing device which is either camera or range sensors based. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  5. 5

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item