Search Results - (( motion evaluation process algorithm ) OR ( user identification using algorithm ))

Refine Results
  1. 1

    Variable block based motion estimation using hexagon diamond full search algorithm (HDFSA) via block subtraction technique by Hardev Singh, Jitvinder Dev Singh

    Published 2015
    “…In the video and frame selection, pre-defined video which have different type of motion and size is used for the algorithm evaluation purpose. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Block based motion vector estimation using fuhs16 uhds16 and uhds8 algorithms for video sequence by S. S. S. , Ranjit

    Published 2011
    “…Block-matching algorithm is the most common technique applied in block-based motion estimation technique. …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  3. 3

    New Fast Block Matching Algorithm Using New Hybrid Search Pattern And Strategy To Improve Motion Estimation Process In Video Coding Technique by Hamid, Nurul 'Atiqah

    Published 2016
    “…Evaluation is based on the algorithm performances in terms of the search points needed to find the final motion vector, the Peak-Signal to Noise Ratio (PSNR) of the algorithms, and the runtime performance of algorithm simulations. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Optimization of Motion Compensated Block-Based DCT Video Compression for Software Implementation by Chen, Soong Der

    Published 2000
    “…Then, various optimized algorithms for the two core processes in the compression, DCT and motion estimation, were reviewed and analyzed. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    Effective predicate identification algorithm for XML retrieval by Roko, Abubakar, C. Doraisamy, Shyamala, Nakone, Bello

    Published 2018
    “…Finally, an effective predicate identification algorithm (EPIA) which uses EBQS and STPS to return relevant predicates is introduced. …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Image restoration techniques for removal of blurred images / Ameer Naeemi Zyarah by Ameer, Naeemi Zyarah

    Published 2017
    “…Blurring is introduced in the process of imaging due to relative motion between camera and scene, atmospheric turbulence, etc. …”
    Get full text
    Get full text
    Thesis
  8. 8

    The impact of executive function and aerobic exercise recognition in obese children under deep learning by JING, XIN, ABDULLAH, BORHANNUDIN, ABU SAAD, HAZIZI, YANG, XIANGKUN

    Published 2025
    “…Initially, a motion recognition model based on STN and Lucas–Kanade optical flow algorithm optimization was constructed. …”
    Get full text
    Get full text
    Article
  9. 9

    Effective query structuring with ranking using named entity categories for XML retrieval by Roko, Abubakar

    Published 2016
    “…Furthermore, it employs Predicates Identification Algorithm (PIA) and Entity Identification Algorithm (EIA) to identify user search intention. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Eeg-Based Person Identification Using Multi-Levelwavelet Decomposition With Multi-Objective Flower Pollination Algorithm by Yahya Alyasseri, Zaid Abdi Alkareem

    Published 2020
    “…For addressing these points, a novel person identification method that is using EEG with multi-level wavelet decomposition and multi-objective flower pollination algorithm is proposed in this thesis. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Effects of user selected conditions on modeling of dynamic systems using adaptive fuzzy model by Yaacob, Mohd. Shafiek, Jamaluddin, Hishamuddin

    Published 2001
    “…The implementation and the computational aspects of the training algorithm are also highlighted. Three examples of discrete-time nonlinear systems are used in the simulation study to show the effects of user selected conditions on the identification process. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13
  14. 14

    Singular value determination for IR-UWB radar sensor-based human motion detection by Terence Jerome Daim, Razak Mohd Ali Lee

    Published 2021
    “…There is, therefore, a need for an output data processing algorithm that generates the required singular value. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Blind motion image deblurring using canny edge detector with generative adversarial networks / Idriss Moussa Idriss by Idriss Moussa , Idriss

    Published 2021
    “…However, blind motion deblurring has remained challenging task for image processing and computer vision. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    ANALYSIS OF MOTION DETECTION IN VIDEO SECURITY SURVEILLANCE SYSTEM by HADRI, MASHAZRINA

    Published 2017
    “…From video sequences, motion detection algorithm can be applied to detect any abnormal behavior, and to recognize the crime using flow of process of behavior recognition. …”
    Get full text
    Get full text
    Final Year Project
  18. 18

    Smart cards and the fingerprint: a framework for user identification and authentication by Omar, M. H., Din, Roshidi, Tahir, H. M.

    Published 2003
    “…As a result, the research proposed a framework for user identification and authentication in automatic-teller-machine (ATM) systems using fingerprints and smart cards as opposed to the PIN and magnetic-stripe cards.…”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Tag clouds algorithm with the inclusion of personality traits by Ahmad Affandi, Supli

    Published 2015
    “…This algorithm is beneficial for decision making using information visualization in which personality traits of the user are heavily inclined. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Identifying the influential spreaders in multilayer interactions of online social networks by Al-Garadi, M.A., Varathan, Kasturi Dewi, Ravana, S.D., Ahmed, E., Chang, V.

    Published 2016
    “…The measurement results are found to be more reliable when the identification algorithms are applied to proposed topological representation compared when these algorithms are applied to single layer representations.…”
    Get full text
    Get full text
    Article