Search Results - (( motion evaluation a algorithm ) OR ( based verification based algorithm ))*
Search alternatives:
- based verification »
- verification based »
- motion evaluation »
- evaluation a »
- a algorithm »
-
1
Moving objects detection from UAV captured videos using trajectories of matched regional adjacency graphs
Published 2017“…Banking on this, region labeling assigns the labels of either background or foreground region based on a proposed graph coloring algorithm, which considers trajectory-based features. …”
Get full text
Get full text
Get full text
Thesis -
2
Development of optimized damage prediction method for health monitoring of ultra high performance fiber-reinforced concrete communication tower
Published 2018“…Therefore, this study aims to develop a new health monitoring system for communication towers based on AdaBoost, Bagging, and RUSBoost algorithms as hybrid algorithm, which can predict the damage by using noisy, random, unstable, and skewed frequency data with high accuracy. …”
Get full text
Get full text
Thesis -
3
Reconstruction algorithm of calibration map for RPT technique in quadrilateral bubble column reactor using MCNPX code
Published 2018“…Calibration algorithm was developed for radioactive isotopes Au-198 and Sc-46 particle position verification and determination of statistical uncertainty from the introduction of a various number of primary photon emission. …”
Get full text
Get full text
Get full text
Article -
4
Dynamic modelling and control of a flexible manipulator
Published 2003“…Subsequently, to achieve uniform performance in the presence of a payload, a collocated adaptive control is designed based on pole-assignment self-tuning control scheme. …”
Get full text
Get full text
Get full text
Thesis -
5
Secured Autonomous Agent-Based Intrusion Detection System (SAAIDS)
Published 2024thesis::master thesis -
6
Stroke-to-stroke matching in on-line signature verification
Published 2010“…On-line Signature Verification is a field of verifying the time series signature data that normally obtained from the tablet-based device. …”
Get full text
Get full text
Thesis -
7
Integration Of Fingerprint Centre Point Location And Principal Component Analysis For Fingerprint Verification
Published 2005“…The Proposed Cp Estimation Algorithm Is Based On The Alteration Tracking (At) Followed By An Estimation Algorithm. …”
Get full text
Get full text
Get full text
Article -
8
Fingerprint verification using clonal selection algorithm / Farah Syadiyah Shamsudin
Published 2017“…There will be two processes involved, which are feature extraction using minutiae-based method and also the implementation of the proposed algorithm, CSA. …”
Get full text
Get full text
Thesis -
9
An evaluation of optical flow algorithms for crowd analytics in surveillance system
Published 2017“…The implementation of optical flow algorithms is investigated and an evaluation of those techniques is provided qualitatively as well as quantitatively. …”
Get full text
Get full text
Article -
10
Variable block based motion estimation using hexagon diamond full search algorithm (HDFSA) via block subtraction technique
Published 2015“…In the video and frame selection, pre-defined video which have different type of motion and size is used for the algorithm evaluation purpose. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
An image-based children age range verification and classification based on facial features angle distribution and face shape elliptical ratio
Published 2017“…The classification and verification algorithm was based on face shape elliptical ratio and facial features angle distribution. …”
Get full text
Get full text
Get full text
Article -
12
-
13
Block based motion vector estimation using fuhs16 uhds16 and uhds8 algorithms for video sequence
Published 2011“…It is the aim of this study that this work provides a common framework with which to evaluate and understand block-based matching motion estimation performance. …”
Get full text
Get full text
Get full text
Book Chapter -
14
Intelligent biometric signature verification system incorporating neural network
Published 2005“…An intelligent feature of the system is made possible through the application of a multilayer feedforward neural network that is used together with suitable algorithms to complement the verification process. The results of the study showed that the system is effective and promising in identifying correct human signatures presented to the system.…”
Get full text
Get full text
Get full text
Article -
15
An efficient technique for human verification using finger stripes geometry
Published 2007“…The Distance Based Nearest Neighbor Algorithm, which shows greater accuracy than NN is also applied here. …”
Get full text
Get full text
Get full text
Article -
16
-
17
A review on particle swarm optimization algorithm and its variants to human motion tracking
Published 2014“…Particle swarm optimization (PSO) is a population-based globalized search algorithm which has been successfully applied to address human motion tracking problem and produced better results in high-dimensional search space.This paper presents a systematic literature survey on the PSO algorithm and its variants to human motion tracking. …”
Get full text
Get full text
Article -
18
Person Verification Based on Multimodal Biometric Recognition
Published 2022“…First, the multimodal biometric person recognition system is developed based on Convolutional Neural Network (CNN) and ORB (Oriented FAST and Rotated BRIEF) algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
19
A new encryption scheme method (ESM) using capsulated-layers conception for verified QR-tag for IoT-based smart access systems
Published 2023“…A new encryption algorithm is proposed and designed which is followed by a verification algorithm used to access such Internet-of-Things (IoT) based systems. …”
Book Chapter -
20
Efficient ML technique in blockchain-based solution in carbon credit for mitigating greenwashing
Published 2025“…This review also examines key performance metrics such as accuracy, precision, recall, and processing time to evaluate the efficiency of various ML algorithms for real-time fraud detection. The findings suggest that integrating ML and blockchain technologies, combined with satellite data, can significantly strengthen transparency and verification in forest carbon credit markets. …”
Get full text
Get full text
Get full text
Article
