Showing 301 - 320 results of 394 for search 'streaming algorithms', query time: 0.06s Refine Results
  1. 301

    The optimization of stepping stone detection: packet capturing steps by Omar, Mohd. Nizam, Maarof, Mond. Aizaini, Zainal, Anazida

    Published 2006
    “…This paper proposes an optimized packet capturing stone detection algorithm that can shorten the response time of overall response mechanism. …”
    Get full text
    Article
  2. 302

    Findings Annihilator(s) via Fault Injection Analysis (FIA) on Boolean Function of LILI-128 by Omar @ Othman, Wan Zariman, Mohd Jawi, Suhairi, Kamel Ariffin, Muhammad Rezal, Mahad, Zahari, Shamsuddin, Solahuddin

    Published 2020
    “…LILI-128 keystream generator was designed by Dawson et al. (2000) and it was submitted to NESSIE project. This LILI-128 algorithm is a LFSR based synchronous stream cipher come with 128 bit key length. …”
    Get full text
    Article
  3. 303

    Secret channel using video steganography by Lee, Kar Yee, Chuah, Chai Wen

    Published 2017
    “…Hence there is a need to encrypt the secret message with stream cipher while not leaving it vulnerable to attacker. …”
    Get full text
    Article
  4. 304

    Embedded system application development on raspberry Pi 3 - (B) : RazPy (face recognition based home surveillance system) by Woon, Yee Py

    Published 2018
    “…At the end of this project, RazPy was able to perform face recognition accurately, send email to users, record footage and support live stream. Further research on deep learning algorithm can be done to further improve the accuracy face of recognition.…”
    Get full text
    Final Year Project (FYP)
  5. 305

    Hazard identification on fractionation column using rule based expert system by Mohd Yunus, Mohd Yusri, Ali, Mohamad Wijayanuddin

    Published 2001
    “…The study has contributed to an improvement of hazard identification technique and proposed an algorithm by considering the whole consequences of process deviation in each stream. …”
    Get full text
    Article
  6. 306

    Highly secured android apps based smart phone by Zhang, Yuzhou

    Published 2019
    “…The program designed as a data encrypt/decrypt application to show the enhanced data encrypt algorithm based on AES and compare the different cipher message for both encrypt algorithm and general AES algorithm. …”
    Get full text
    Final Year Project (FYP)
  7. 307

    Influence maximization on dynamic graphs by Lim, Zi Xiang

    Published 2017
    “…In the real world, there are many applications of the stream such as social networks and telecommunication networks. …”
    Get full text
    Final Year Project (FYP)
  8. 308

    Adaptive multi-polling scheduler for QoS support of video transmission in IEEE 802.11e WLANs by Al-Maqri, Mohammed A., Othman, Mohamed, Mohd Ali, Borhanuddin, Mohd Hanapi, Zurina

    Published 2016
    “…In this paper, we present a dynamic TXOP assignment algorithm called adaptive multi-polling TXOP scheduling algorithm (AMTXOP) for supporting the video traffics transmission over IEEE 802.11e wireless networks. …”
    Get full text
    Article
  9. 309
  10. 310
  11. 311
  12. 312

    Perceptual and content based analysis for coding multimedia information by Xue, Ping.

    Published 2008
    “…Chapter 1 deals with the topic of content-based image retrieval (CBIR), where three new approaches are proposed: 1) a framework of knowledge-driven CBIR; 2) a criterion to maximize the retrieval performance of Kernel-based Biased Discriminant Analysis (KBDA); and 3) a novel saliency-weighted region-based image retrieval (SW-RBIR) algorithm. This leads to a new image retrieval strategy, where a suitable CBIR algorithm is selected based on image characteristics of foreground objects and backgrounds. …”
    Get full text
    Research Report
  13. 313

    Gaze correction for videoconferencing by Lim, Kim Seah.

    Published 2009
    “…The two webcams will be used to capture two separate live video streams which will be processed in an open-source computer vision software, OpenCV. …”
    Get full text
    Final Year Project (FYP)
  14. 314

    Visual tracking and servoing of human face for robotic head Amir-II by Shafie, Amir Akramin, Iqbal, Aseef, Khan, Md. Raisuddin

    Published 2010
    “…The algorithm basically compares the locations of the face in the image plane that is detected from the static face image captured from real-time video stream. …”
    Get full text
    Proceeding Paper
  15. 315

    Fast ellipse detection via gradient information for robotic manipulation of cylindrical objects by Dong, Huixu, Sun, Guangbin, Pang, Wee-Ching, Asadi, Ehsan, Prasad, Dilip Kumar, Chen, I-Ming

    Published 2020
    “…Lastly, the algorithm is applied to identifying cylindrical objects in real-time for arranging and tracking purposes.…”
    Get full text
    Journal Article
  16. 316
  17. 317
  18. 318
  19. 319

    Design and implementation of multimedia digital matrix system by Chui, Yew Leong, Ramli, Abdul Rahman, Perumal, Thinagaran, Sulaiman, Mohd Yusof, Ali, Mohd Liakot

    Published 2005
    “…The problem is about the incapability of embedded clock extraction from serial data stream with unpredictable center of data eye. Besides, the algorithm enables an accurate prediction to the center of data eye with an even number of oversampling clock to data rate ratio. …”
    Get full text
    Conference or Workshop Item
  20. 320

    Hydrokinetic energy harnessing for river application by Wan Ismail, Ibrahim, Raja Mohd Taufika, Raja Ismail, Marina, Mohamed

    Published 2018
    “…Double multiple streamtube (DMS) algorithm in QBlade software has been used to determine the rotor performance. …”
    Get full text
    Article