Search Results - (( parallel optimization path algorithm ) OR ( frames extraction system algorithm ))

Refine Results
  1. 1

    An Improved Action Key Frames Extraction Algorithm for Complex Colour Video Shot Summarization by Mizher, Manar Abduljabbar Ahmad, Ang, Mei Choo, Sheikh Abdullah, Siti Norul Huda, Kok, Weng Ng

    Published 2019
    “…The objective of this work is to improve our previous action key frames extraction algorithm (AKF) by adapting a threshold which selects action key frames as final key frames. …”
    Get full text
    Get full text
    Article
  2. 2

    Tool path generation of contour parallel based on ant colony optimisation by Abdullah, Haslina, Ramli, Rizauddin, Abd Wahab, Dzuraidah, Abu Qudeiri, Jaber

    Published 2016
    “…An Ant Colony Optimisation (ACO) method is used to optimize the tool path length because of its capability to find the shortest tool path length. …”
    Get full text
    Get full text
    Article
  3. 3
  4. 4
  5. 5
  6. 6

    An Algorithm for Vehicle Detection and Tracking by Malik , Aamir Saeed

    Published 2010
    “…One of the advantages of this system is that each vehicle in the frame is classified into different color boxes. …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7
  8. 8
  9. 9

    Restoration planning strategy of transmission system based on optimal energizing time of sectionalizing islands / Dian Najihah Abu Talib by Dian Najihah , Abu Talib

    Published 2019
    “…There are two discrete optimization techniques used in this work, which are the Artificial Bee Colony algorithm and Evolutionary Programming. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Video surveillance: Item monitoring against theft by Chong, Yiing Sheah

    Published 2023
    “…Else, the time will be set to 0. After that, the system will get the current frame to find the common features with the background frame by using a feature matching algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  12. 12
  13. 13

    Face recognition based automated student attendance system by Chin, Howard

    Published 2018
    “…Hence, we have proposed an automated student attendance system based on face recognition. Face recognition system is very useful in life applications especially in security control systems. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  14. 14

    Gender identification of children using hidden Markov model based on Mel-frequency cepstral coefficient / Adira Ibrahim by Adira, Ibrahim

    Published 2013
    “…Mel Frequency Cepstral Coefficient (MFCC) was applied as the feature extraction method. HMM was trained with Baum-Welch algorithm and tested with Viterbi algorithm to get the gender identification accuracy. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Shunt active power filter with modified synchronous reference frame technique and fuzzy logic current controller for harmonic mitigation by Suleiman, Musa

    Published 2017
    “…First, harmonic extraction using SRF for three-phase three-wire system introduces a band pass filter, and second, simple three membership functions in fuzzy logic controller for inputs and five outputs are designed to improve performance of the switching algorithm. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Improving performance of automated coronary arterial tree center-line extraction, stent localization and tracking by Boroujeni, Farsad Zamani

    Published 2012
    “…In this research work, we report on new contributions to the major parts of a computer assisted stent positioning system. The first contribution is automatic detection of seed points which serve as a prerequisite step for centerline extraction algorithm. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Development Of A Robust Blind Digital Video Watermarking Algorithm Using Discrete Wavelet Transform by Al-Deen, Ahmed A. Baha'a

    Published 2007
    “…On the other hand, a random key is used to choose the frames to be watermarked to increase the security level of the algorithm and discourage piracy. …”
    Get full text
    Get full text
    Thesis
  18. 18

    A novel large-bit-size architecture and microarchitecture for the implementation of Superscalar Pipeline VLIW microprocessors by Lee, Weng Fook

    Published 2008
    “…Different adder architectures are investigated for suitability on synthesis implementation of large data bus size adder for efficient usage within the ALU. An adder algorithm using repetitive constructs in a parallel algorithm that allows for efficient and optimal synthesis for large data bus size is proposed as a suitable implementation for the adder within the ALU. …”
    Get full text
    Thesis
  19. 19

    Tracking and indexing moving object in multitude environment by Abdul Kadir, Muhd. Khairulzaman

    Published 2007
    “…The complexity also is more complicated if it involves moving object occlusion and illuminations change in the image frame. In this tracking and indexing system, background subtraction model for each frame is being used for extracting the moving object from the background. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Particle swarm optimization with deep learning for human action recognition by Usmani, U.A., Watada, J., Jaafar, J., Aziz, I.A., Roy, A.

    Published 2021
    “…However, such methods necessitate a constant false-alarm rate system that detects the whole frame obtained at the moment. …”
    Get full text
    Get full text
    Article