Search Results - (( motion evaluation process algorithm ) OR ( user identification using algorithm ))
Search alternatives:
- identification using »
- user identification »
- motion evaluation »
- process algorithm »
- using algorithm »
-
1
Variable block based motion estimation using hexagon diamond full search algorithm (HDFSA) via block subtraction technique
Published 2015“…In the video and frame selection, pre-defined video which have different type of motion and size is used for the algorithm evaluation purpose. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
Block based motion vector estimation using fuhs16 uhds16 and uhds8 algorithms for video sequence
Published 2011“…Block-matching algorithm is the most common technique applied in block-based motion estimation technique. …”
Get full text
Get full text
Get full text
Book Chapter -
3
New Fast Block Matching Algorithm Using New Hybrid Search Pattern And Strategy To Improve Motion Estimation Process In Video Coding Technique
Published 2016“…Evaluation is based on the algorithm performances in terms of the search points needed to find the final motion vector, the Peak-Signal to Noise Ratio (PSNR) of the algorithms, and the runtime performance of algorithm simulations. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
4
Optimization of Motion Compensated Block-Based DCT Video Compression for Software Implementation
Published 2000“…Then, various optimized algorithms for the two core processes in the compression, DCT and motion estimation, were reviewed and analyzed. …”
Get full text
Get full text
Thesis -
5
Minimizing machining airtime motion with an ant colony algorithm
Published 2016Get full text
Get full text
Article -
6
Effective predicate identification algorithm for XML retrieval
Published 2018“…Finally, an effective predicate identification algorithm (EPIA) which uses EBQS and STPS to return relevant predicates is introduced. …”
Get full text
Get full text
Conference or Workshop Item -
7
Image restoration techniques for removal of blurred images / Ameer Naeemi Zyarah
Published 2017“…Blurring is introduced in the process of imaging due to relative motion between camera and scene, atmospheric turbulence, etc. …”
Get full text
Get full text
Thesis -
8
The impact of executive function and aerobic exercise recognition in obese children under deep learning
Published 2025“…Initially, a motion recognition model based on STN and Lucas–Kanade optical flow algorithm optimization was constructed. …”
Get full text
Get full text
Article -
9
Effective query structuring with ranking using named entity categories for XML retrieval
Published 2016“…Furthermore, it employs Predicates Identification Algorithm (PIA) and Entity Identification Algorithm (EIA) to identify user search intention. …”
Get full text
Get full text
Get full text
Thesis -
10
-
11
Eeg-Based Person Identification Using Multi-Levelwavelet Decomposition With Multi-Objective Flower Pollination Algorithm
Published 2020“…For addressing these points, a novel person identification method that is using EEG with multi-level wavelet decomposition and multi-objective flower pollination algorithm is proposed in this thesis. …”
Get full text
Get full text
Thesis -
12
Effects of user selected conditions on modeling of dynamic systems using adaptive fuzzy model
Published 2001“…The implementation and the computational aspects of the training algorithm are also highlighted. Three examples of discrete-time nonlinear systems are used in the simulation study to show the effects of user selected conditions on the identification process. …”
Get full text
Get full text
Get full text
Article -
13
An indoor based push notification for location-based marketing using bluetooth smart ready technology / Nur Farehah Alias
Published 2017“…Android smartphone is used in order to test this algorithm.…”
Get full text
Get full text
Thesis -
14
Singular value determination for IR-UWB radar sensor-based human motion detection
Published 2021“…There is, therefore, a need for an output data processing algorithm that generates the required singular value. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Blind motion image deblurring using canny edge detector with generative adversarial networks / Idriss Moussa Idriss
Published 2021“…However, blind motion deblurring has remained challenging task for image processing and computer vision. …”
Get full text
Get full text
Get full text
Thesis -
16
Relative motion guidance, navigation and control for autonomous spacecraft rendezvous
Published 2011Get full text
Get full text
Get full text
Proceeding Paper -
17
ANALYSIS OF MOTION DETECTION IN VIDEO SECURITY SURVEILLANCE SYSTEM
Published 2017“…From video sequences, motion detection algorithm can be applied to detect any abnormal behavior, and to recognize the crime using flow of process of behavior recognition. …”
Get full text
Get full text
Final Year Project -
18
Smart cards and the fingerprint: a framework for user identification and authentication
Published 2003“…As a result, the research proposed a framework for user identification and authentication in automatic-teller-machine (ATM) systems using fingerprints and smart cards as opposed to the PIN and magnetic-stripe cards.…”
Get full text
Get full text
Get full text
Article -
19
Tag clouds algorithm with the inclusion of personality traits
Published 2015“…This algorithm is beneficial for decision making using information visualization in which personality traits of the user are heavily inclined. …”
Get full text
Get full text
Get full text
Thesis -
20
Identifying the influential spreaders in multilayer interactions of online social networks
Published 2016“…The measurement results are found to be more reliable when the identification algorithms are applied to proposed topological representation compared when these algorithms are applied to single layer representations.…”
Get full text
Get full text
Article
