Search Results - (( deviation detection method algorithm ) OR ( frames extraction method algorithm ))
Search alternatives:
- deviation detection »
- frames extraction »
- method algorithm »
-
1
An Improved Action Key Frames Extraction Algorithm for Complex Colour Video Shot Summarization
Published 2019“…The objective of this work is to improve our previous action key frames extraction algorithm (AKF) by adapting a threshold which selects action key frames as final key frames. …”
Get full text
Get full text
Article -
2
Lane markings detection based on e-maxima transformation and improved hough
Published 2012“…A short segment of a long curve with a relatively low curvature is approximated as a straight line, based on this point, the important contribution of this thesis presents a lane detection algorithm using E-MAXIMA transformation and improved Hough transform which is the algorithm with great efficiency, high robustness and also at low cost to detect road lane markings. …”
Get full text
Get full text
Thesis -
3
Deviation detection in text using conceptual graph interchange format and error tolerance dissimilarity function
Published 2012“…We propose a novel error tolerance dissimilarity algorithm to detect deviations in the CGIFs. We evaluate our method in the context of analyzing real world financial statements for identifying deviating performance indicators. …”
Get full text
Get full text
Get full text
Article -
4
-
5
A fast feature extraction algorithm for image and video processing
Published 2019“…These features are used to represent the local visual content of images and video frames. We compared the proposed method with the traditional approach of feature extraction using a standard image technique. …”
Get full text
Get full text
Conference or Workshop Item -
6
AR oriented pose matching mechanism from motion capture data
Published 2023“…In order to extract the exact matched pose, the frame sequence is divided into pose feature frame and skeletal data frame by the use of pose matching dance training movement recognition algorithm (PMDTMR). …”
Article -
7
Automated threshold detection for object segmentation in colour image
Published 2016“…In solving this issue, this paper presents an Automated Threshold Detection Algorithm, H(•). The algorithm is applied in segmenting human lower limbs from a series of image frames of human walking. …”
Get full text
Get full text
Get full text
Get full text
Article -
8
Local DTW coefficients and pitch feature for back-propagation NN digits recognition
Published 2006“…The LPC features vectors are aligned between the source frames to the template using our DTW frame fixing (DTW-FF) algorithm. …”
Get full text
Conference or Workshop Item -
9
Time normalization of LPC feature using warping method
Published 2005Get full text
Get full text
Get full text
Article -
10
Fault diagnostic algorithm for precut fractionation column
Published 2004“…Hazard and Operability Study (HAZOP) is used to support the diagnosis task. The algorithm has been successful in detecting the deviations of each variable by testing the data set. …”
Get full text
Get full text
Conference or Workshop Item -
11
Image classification using two dimensional wavelet coefficients with parallel computing
Published 2020“…This method is capable to shorten the process time of the computation-intensive program in this research to process the live images frame by frame, which received from a laptop webcam to achieve real-time video processing. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
12
Local DTW Coefficients and Pitch Feature for Back-Propagation NN Digits Recognition
Published 2006“…The LPC features vectors are aligned between the source frames to the template using our DTW frame fixing (DTW-FF) algorithm. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
Get full text
Get full text
Thesis -
14
A new multi-frames watermarking technique for tamper detection and recovery
Published 2017“…The objectives of the research are to resolve the time constraint of sequential multi-frames watermarking process. The sequential multi-frames watermarking process could be speed up by two methods, first method was designed a speedy watermarking scheme algorithm (ROI-DR) in a single frame of medical image, and the second method was developed a new multi-frames watermarking scheme by adding parallelism component into sequential multi-frames watermarking process. …”
Get full text
Get full text
Thesis -
15
A study on advanced statistical analysis for network anomaly detection
Published 2005“…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
Get full text
Monograph -
16
A wavelet based watermarking algorithm for video
Published 2005“…In this algorithm, to achieve better imperceptibility and robustness a binary image watermark is inserted into the middle frequency subband coefficients of the blue component of the video frame. …”
Get full text
Get full text
Conference or Workshop Item -
17
Image Stitching Of Aerial Footage
Published 2021“…The implemented method successfully stitched the frames extracted from the aerial footage to generate a large scene image beyond the normal resolution.…”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
18
Parameter estimation and outlier detection in linear functional relationship model / Adilah Abdul Ghapor
Published 2017“…The simulation results indicate that the proposed method is suitable to detect a single outlier. As for the multiple outliers, a clustering algorithm is considered and a dendogram to visualise the clustering algorithm is used. …”
Get full text
Get full text
Get full text
Thesis -
19
Development of a rule-based fault diagnostic advisory system for precut fractionation column
Published 2005“…The advisory system algorithm used process history based method and presented by rule-based approach. …”
Get full text
Get full text
Thesis -
20
Comparative study of clustering-based outliers detection methods in circular-circular regression model
Published 2021“…This paper is a comparative study of several algorithms for detecting multiple outliers in circular-circular regression model based on the clustering algorithms. …”
Get full text
Get full text
Get full text
Article
