Search Results - (( based applications out algorithm ) OR ( _ application matching algorithm ))*

Refine Results
  1. 1

    Simulated kalman filter (SKF) based image template matching for distance measurement by using stereo vision system by Nurnajmin Qasrina Ann, Ayop Azmi

    Published 2018
    “…In addition, it is expected that it can be applied in real-time application. In this study, Simulated Kalman Filter (SKF) is applied to image template matching application as the optimization algorithm. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6

    Image matching using relational graph representation by Lai, Chui Yen

    Published 2005
    “…Experiments are carried out to evaluate the applicability of incorporating structural information into the image matching algorithm. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8
  9. 9

    Online food ordering application using Boyer-Moore algorithm / Muhammad Zulhilmie Dzulkifli by Dzulkifli, Muhammad Zulhilmie

    Published 2021
    “…The main goal of this study is to create an online food ordering app using the corresponding Boyer-Moore string matching algorithm. The application evaluation process is carried out by the developer's functionality test to ensure that there are no unnecessary issues in this app, especially in the main feature. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Web application vulnerabilities detection model by Buja, Alya Geogiana, Abd. Jalil, Kamarularifin, Mohd Ali, Fakariah, Abdul Rahman, Teh Faradilla

    Published 2016
    “…The research will be carried out by using design string matching algorithm. The algorithm is used in order to match the defined criteria of each web vulnerability with the input information about web application. …”
    Get full text
    Get full text
    Research Reports
  11. 11

    Applying empirical thresholding algorithm for a keystroke dynamics based authentication system by Venugopal, Priya Chaliyath, Viji, Kamalan Saroja Angel

    Published 2019
    “…Through the application of a password-based authentication technique, users are granted permission to access a secure system when the username and password matches with that logged in database of the system. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12
  13. 13
  14. 14

    Object Localization In 3D Point Cloud by Chung, Hui Sze

    Published 2020
    “…Object localization in 3D point cloud is one of the most complex yet interesting applications in computer vision, robotics and autonomous agents. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  15. 15

    Fuzzy logic based mppt control for a thermoelectric generator system by Nur Aidil Jazmin, Juhari, Raja Mohd Taufika, Raja Ismail

    Published 2022
    “…Detailed modeling, simulation, and verification of TEGs depending on the Seebeck coefficient, the hot/cold side temperatures, and the number of modules in MATLAB/Simulink were carried out. In addition, a boost converter having a Fuzzy Logic Controller (FLC) based MPPT algorithm was added to the TEG modeling. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16
  17. 17
  18. 18
  19. 19

    Car plate recognition based on stroke composition technique / Samsul Setumin, Mohd Ikmal Fitri Maruzuki and Shahrul Nizam Ishak. by Setumin, Samsul, Maruzuki, Mohd Ikmal Fitri, Ishak, Shahrul Nizam

    Published 2012
    “…These different approaches are customized for their various applications. In this algorithm however, it comprises two main processes; character extraction and stroke analysis. …”
    Get full text
    Get full text
    Research Reports
  20. 20

    Slam-based mapping for object recognition by Loh, Wan Ying

    Published 2018
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis