Search Results - (( motion evaluation step algorithm ) OR ( user identification based algorithm ))*
Search alternatives:
- identification based »
- user identification »
- motion evaluation »
- evaluation step »
- step algorithm »
-
1
Block matching algorithms for motion estimation using modified Cross-Diamond-Hexagonal search / Abd Razak Mahmud
Published 2008“…This algorithm basically employs two crossshaped search patterns consecutively in the very beginning steps and switch using diamond-shaped patterns. …”
Get full text
Get full text
Thesis -
2
Block based motion vector estimation using fuhs16 uhds16 and uhds8 algorithms for video sequence
Published 2011“…Block-matching algorithm is the most common technique applied in block-based motion estimation technique. …”
Get full text
Get full text
Get full text
Book Chapter -
3
A real-time vision-based touchless interaction of virtual heart using integration of motion gesture interaction methods
Published 2014“…"Motion gesture is one of the gesture recognition algorithms which provide touchless interaction within a system. …”
Get full text
Get full text
Academic Exercise -
4
Optimization of Motion Compensated Block-Based DCT Video Compression for Software Implementation
Published 2000“…The proposed new algorithm was evaluated and the results indicate that it was practical in low bit rate environments targeted by H.263 as no negative speed gain was observed for the full range of step size during the evaluation. …”
Get full text
Get full text
Thesis -
5
Moving objects detection from UAV captured videos using trajectories of matched regional adjacency graphs
Published 2017“…Overall, the framework consisting of these two steps is termed as Motion Differences of Matched Region-based Features (MDMRBF). …”
Get full text
Get full text
Get full text
Thesis -
6
New Fast Block Matching Algorithm Using New Hybrid Search Pattern And Strategy To Improve Motion Estimation Process In Video Coding Technique
Published 2016“…Evaluation is based on the algorithm performances in terms of the search points needed to find the final motion vector, the Peak-Signal to Noise Ratio (PSNR) of the algorithms, and the runtime performance of algorithm simulations. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
-
8
Effective predicate identification algorithm for XML retrieval
Published 2018“…Finally, an effective predicate identification algorithm (EPIA) which uses EBQS and STPS to return relevant predicates is introduced. …”
Get full text
Get full text
Conference or Workshop Item -
9
An indoor based push notification for location-based marketing using bluetooth smart ready technology / Nur Farehah Alias
Published 2017“…Therefore, this project has proposed a method called token based alert notification. There are three algorithm developed for token based alert notification which is tokenization algorithm, token matching algorithm and item identification algorithm. …”
Get full text
Get full text
Thesis -
10
Eeg-Based Person Identification Using Multi-Levelwavelet Decomposition With Multi-Objective Flower Pollination Algorithm
Published 2020“…Recently, several studies showed that the brain electrical activity or electroencephalogram (EEG) signals provide unique features that can be considered as user identification techniques. But, it is a challenging task where there are three important things must be addressed carefully in any EEG-based person identification. …”
Get full text
Get full text
Thesis -
11
Effects of user selected conditions on modeling of dynamic systems using adaptive fuzzy model
Published 2001“…The implementation and the computational aspects of the training algorithm are also highlighted. Three examples of discrete-time nonlinear systems are used in the simulation study to show the effects of user selected conditions on the identification process. …”
Get full text
Get full text
Get full text
Article -
12
Fault Detection and Identification in Quadrotor System (Quadrotor Robot)
Published 2016“…The aim of the research is to construct and design a Fault Detection and Isolation algorithm. This dynamic model is based on the first principles of the Quadrotor: Propeller model and its force as well as moments generation. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
Tag clouds algorithm with the inclusion of personality traits
Published 2015“…Therefore, the main objective of this study is to develop an algorithm that can adapt visual features of tag cloud layout styles based on personality traits of the user. …”
Get full text
Get full text
Get full text
Thesis -
14
Effective query structuring with ranking using named entity categories for XML retrieval
Published 2016“…Furthermore, it employs Predicates Identification Algorithm (PIA) and Entity Identification Algorithm (EIA) to identify user search intention. …”
Get full text
Get full text
Get full text
Thesis -
15
A graphical user interface application for continuous-time identification of dynamical system
Published 2002“…This paper introduces a Graphical User Interface (GUI) application in system identification and parameter estimation of dynamic systems using Generalized Poisson Moment Functionals (GPMF) method based on Instrumental Variable (IV) algorithm. …”
Get full text
Get full text
Get full text
Article -
16
An Improved Spiral Dynamic Optimization Algorithm with Engineering Application
Published 2015“…The spiral motion and dynamic step size are generated by a spiral model that produces unique exploration and exploitation strategies of a spiral dynamic algorithm (SDA). …”
Get full text
Get full text
Get full text
Article -
17
An enhanced version of black hole algorithm via levy flight for optimization and data lustering problems
Published 2019“…In LBH, the movement of each star depends mainly on the step size generated by the Levy distribution. Therefore, the star explores an area far from the current black hole when the value step size is big, and vice versa. …”
Get full text
Get full text
Get full text
Article -
18
An efficient fuzzy clustering algorithm for mining user session clusters on web log data
Published 2021“…Because there are so many end-user sessions and URL resources, the size of web user session data is enormous. …”
Get full text
Get full text
Get full text
Get full text
Article -
19
Video surveillance: Front-yard monitoring
Published 2023“…Here, the YOLO algorithm will be used for human detection. When there is a human presence, the second stage checks for excessive motions resembling violence with dense optical flow. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
20
An enhanced version of black hole algorithm via levy flight for optimization and data clustering problems
Published 2019“…In LBH, the movement of each star depends mainly on the step size generated by the Levy distribution. Therefore, the star explores an area far from the current black hole when the value step size is big, and vice versa. …”
Get full text
Get full text
Get full text
Article
