Search Results - (( frames extraction method algorithm ) OR ( rate detection method algorithm ))

Refine Results
  1. 1

    Particle swarm optimization with deep learning for human action recognition by Usmani, U.A., Watada, J., Jaafar, J., Aziz, I.A., Roy, A.

    Published 2021
    “…To accomplish the purpose of tracking a target, traditional approaches first perform the detection process and then track the target. However, such methods necessitate a constant false-alarm rate system that detects the whole frame obtained at the moment. …”
    Get full text
    Get full text
    Article
  2. 2

    Identifying and detecting unlawful behavior in video images using genetic algorithm / Shahirah Mohamed Hatim by Mohamed Hatim, Shahirah

    Published 2016
    “…GA is used as the method of unlawful behavior detection. Previous research on GA components impact evaluation has identified selection parameter as high potential of increasing GA performance for unlawful behavior detection. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Enhanced mechanism to handle missing data of Hadith classifier by Aldhlan, Kawther A., Zeki, Ahmed M., Zeki, Akram M.

    Published 2011
    “…Meanwhile, with naïve bayes algorithm, the accurate rate has been improved by 0.6%. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  4. 4

    Frontal View Gait Recognition With Fusion of Depth Features From a Time of Flight Camera by Tengku Mohd Afendi, Zulcaffle, Fatih, Kurugollu, Crookes, Danny, Ahmed, Bouridane, Mohsen, Farid

    Published 2019
    “…The data set includes two sessions recorded seven months apart, with 46 and 33 subjects, respectively, each with six walks with five covariates. The four-part method includes: a new human silhouette extraction algorithm that reduces the multiple reflection problem experienced by ToF cameras; a frame selection method based on a new gait cycle detection algorithm; four new gait image representations; and a novel fusion classifier. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Frontal view gait recognition with fusion of depth features from a time of flight camera by Tengku Mohd Afendi, Zulcaffle, Kurugollu, F., Crookes, D., Bouridane, A., Farid, M.

    Published 2018
    “…The data set includes two sessions recorded seven months apart, with 46 and 33 subjects, respectively, each with six walks with five covariates. The four-part method includes: A new human silhouette extraction algorithm that reduces the multiple reflection problem experienced by ToF cameras; a frame selection method based on a new gait cycle detection algorithm; four new gait image representations; and a novel fusion classifier. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Lane markings detection based on e-maxima transformation and improved hough by Xiao, Rui

    Published 2012
    “…The experimental results based on collected video data under complex illumination conditions had proved that the proposed algorithm is able to detect the road lane marking efficiently achieving a correction rate of 95.33%. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Development of sorting system for oil palm in vitro shoots using machine vision approach by Al-Ruhaimi, Hamdan Yahya Ahmed

    Published 2014
    “…A smart object tracking algorithm (SOTA) has been proposed for detecting and identifying the shoot on the conveyor belt. …”
    Get full text
    Get full text
    Thesis
  8. 8

    An Improved Action Key Frames Extraction Algorithm for Complex Colour Video Shot Summarization by Mizher, Manar Abduljabbar Ahmad, Ang, Mei Choo, Sheikh Abdullah, Siti Norul Huda, Kok, Weng Ng

    Published 2019
    “…The objective of this work is to improve our previous action key frames extraction algorithm (AKF) by adapting a threshold which selects action key frames as final key frames. …”
    Get full text
    Get full text
    Article
  9. 9

    Object tracing from synthetic fluid spray through instance segmentation by Md Refat Khan, Pathan

    Published 2024
    “…The resulting objects were then analyzed using a customized nearest neighbor algorithm to calculate their correspondence between frames and a BFS algorithm was used to trace their movement path. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    A fast feature extraction algorithm for image and video processing by Abdulhussain, Sadiq H., Ramli, Abdul Rahman, Mahmmod, Basheera M., Saripan, M. Iqbal, Syed Mohamed, Syed Abdul Rahman Al-Haddad, Baker, Thar, Flayyih, Wameedh Nazar, Jassim, Wissam A.

    Published 2019
    “…These features are used to represent the local visual content of images and video frames. We compared the proposed method with the traditional approach of feature extraction using a standard image technique. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    AR oriented pose matching mechanism from motion capture data by Iqbal J., Sidhu M.S., Ariff M.B.M.

    Published 2023
    “…In order to extract the exact matched pose, the frame sequence is divided into pose feature frame and skeletal data frame by the use of pose matching dance training movement recognition algorithm (PMDTMR). …”
    Article
  13. 13

    Automated threshold detection for object segmentation in colour image by Akhtaruzzaman, Md., Shafie, Amir Akramin, Khan, Md. Raisuddin

    Published 2016
    “…In solving this issue, this paper presents an Automated Threshold Detection Algorithm, H(•). The algorithm is applied in segmenting human lower limbs from a series of image frames of human walking. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Local DTW coefficients and pitch feature for back-propagation NN digits recognition by Sudirman, R., Salleh, Shahruddin Hussain, Salleh, Sh-Hussain

    Published 2006
    “…The LPC features vectors are aligned between the source frames to the template using our DTW frame fixing (DTW-FF) algorithm. …”
    Get full text
    Conference or Workshop Item
  15. 15
  16. 16

    Image classification using two dimensional wavelet coefficients with parallel computing by Ong, Yew Fai

    Published 2020
    “…This method is capable to shorten the process time of the computation-intensive program in this research to process the live images frame by frame, which received from a laptop webcam to achieve real-time video processing. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  17. 17

    Local DTW Coefficients and Pitch Feature for Back-Propagation NN Digits Recognition by Sudirman, Rubita, Salleh, Sh-Hussain, Salleh, Shaharuddin

    Published 2006
    “…The LPC features vectors are aligned between the source frames to the template using our DTW frame fixing (DTW-FF) algorithm. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Machine learning algorithms in context of intrusion detection by Mehmood, T., Rais, H.B.Md.

    Published 2016
    “…Asymmetrically, anomaly based detection method can detect novel attacks but it has high false positive rate. …”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    A new multi-frames watermarking technique for tamper detection and recovery by Khor, Hui Liang

    Published 2017
    “…The objectives of the research are to resolve the time constraint of sequential multi-frames watermarking process. The sequential multi-frames watermarking process could be speed up by two methods, first method was designed a speedy watermarking scheme algorithm (ROI-DR) in a single frame of medical image, and the second method was developed a new multi-frames watermarking scheme by adding parallelism component into sequential multi-frames watermarking process. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Algorithm enhancement for host-based intrusion detection system using discriminant analysis by Dahlan, Dahliyusmanto

    Published 2004
    “…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
    Get full text
    Get full text
    Thesis