Search Results - (( frames estimation machine algorithm ) OR ( java location based algorithm ))

Refine Results
  1. 1

    REGION-BASED ADAPTIVE DISTRIBUTED VIDEO CODING CODEC by ABDELRAHMAN ELAMIN, ABDELRAHMAN ELAMIN

    Published 2011
    “…However, the rate cannot be exactly calculated at the encoder, instead it can only be estimated. This work also prbposes a feedback-free region-based adaptive DVC solution in pixel domain based on machine learning approach to estimate the side information. …”
    Get full text
    Get full text
    Thesis
  2. 2

    REAL-TIME HORN-SCHUNCK OPTICAL FLOW HARDWARE ARCHITECTURE FOR HIGH ACCURACY MOTION ESTIMATION by RUZALI, RUZALI

    Published 2012
    “…To achieve real-time performance and high accuracy estimation for real-time system especially for machine vision application, numerous efforts have been put to implement the OFCE-HS algorithm into hardware. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Algorithm of local features fusion and modified covariance-matrix technique for hand motion position estimation and hand gesture trajectory tracking approach by Thabet, Eman, Khalid, Fatimah, Sulaiman, Puteri Suhaiza, Yaakob, Razali

    Published 2020
    “…Especially with COVID19 outbreak spreading around the world, where people take a risk and avoid dealing with electronic consumer machines that required hand touching. However, in any dynamic hand gesture recognition system, dynamic hand gesture tracking is a very hard task, where position estimation over video frames for freely moving hand in the air is quite challenging. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Drone Based People Counter And Tracking Using Unique Id Using Opencv Python by Bhaskar, Hariyaran

    Published 2020
    “…The algorithm is developed so that it is capable to detect various objects by applying a bounding box on the frame image. …”
    Get full text
    Get full text
    Monograph
  5. 5
  6. 6

    Group formation using genetic algorithm by Che Ani, Zhamri, Husin, Mohd Zabidin, Yasin, Azman

    Published 2009
    “…However, due to lack of programming skills especially in Java programming language and the inability to have meetings frequently among the group members,most of the students’ software project cannot be delivered successfully.To solve this problem, systematic group formation is one of the initial factors that should be considered to ensure that every group consists of quality individuals who are good in Java programming and also to ensure that every group member in a group are staying closer to each other.In this research, we propose a method for group formation using Genetic Algorithms, where the members for each group will be generated based on the students’ programming skill and location of residential colleges.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Monograph
  7. 7

    Multi-floor indoor location estimation system based on wireless local area network by Chua, Tien Han

    Published 2007
    “…The most probable match is selected and returned as estimated location based on Bayesian filtering algorithm. Estimated location is reported as physical location and symbolic location. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9
  10. 10
  11. 11

    Indirect Rotor Field Oriented Control of Induction Motor With Rotor Time Constant Estimation by Moh'd Radwan, Eyad Moh'd

    Published 2004
    “…In this estimation technique two different equations are used to estimate the rotor flux in the stator reference frame. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform by Alias, Norma, Satam, Noriza, Abd. Ghaffar, Zarith Safiza, Darwis, Roziha, Hamzah, Norhafiza, Islam, Md. Rajibul

    Published 2009
    “…The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption by Yeo Zi Zian

    Published 2022
    “…Subsequently, this project embedded with a lightweight Geo-Encryption algorithm to preserve the privacy of real-time GPS location. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  14. 14

    Detection and Classification of Moving Objects for an Automated Surveillance System by Md. Tomari, Mohd Razali

    Published 2006
    “…Technically, this method estimate the motion area before updates the background by taking a weighted average of non-motion area of the current background altogether with non-motion area of the current frame of the video sequence. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Detection and classification of moving objects for an automated surveillance system by Md Tomari, Mohd Razali

    Published 2006
    “…Technically, this method estimate the motion area before updates the background by taking a weighted average of non-motion area of the current background altogether with non-motion area of the current frame of the video sequence. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Detection and classification of moving objects for an automated surveillance system by Md Tomari, Mohd Razali

    Published 2006
    “…Technically, this method estimate the motion area before updates the background by taking a weighted average of non-motion area of the current background altogether with non-motion area of the current frame of the video sequence. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    Friendship Degree and Tenth Man Strategy: A new method for differentiating between erroneous readings and true events in wireless sensor networks by Adday, Ghaihab Hassan, Subramaniam, Shamala K., Zukarnain, Zuriati Ahmad, Samian, Normalia

    Published 2023
    “…The second stage will validate the voting process through a novel perspective based on the TMS. TMS will check the voters’ replies based on the event’s location. …”
    Get full text
    Get full text
    Article
  19. 19

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Fuzzy-based multi-agent approach for reliability assessment and improvement of power system protection by Nadheer Abdulridha, Shalash

    Published 2015
    “…The second agent is a reliability evaluation agent that uses a recursive algorithm to predict the suitability generator based on the frequency and duration reliability indices in each state while the third agent is the storage and transfer of data between the other two agents. …”
    Get full text
    Get full text
    Thesis