Search Results - (( parameter detection method algorithm ) OR ( frames extraction utilizing algorithm ))

Refine Results
  1. 1

    Efficient NASNetMobile-enhanced Vision Transformer for weakly supervised video anomaly detection by Arif Mohamad, Muhammad Luqman, Abd Rahman, Mohd Amiruddin, Mohd Shah, Nurisya, Kumar Sangaiah, Arun

    Published 2026
    “…Second, we employed a pretrained, low-parameter NASNetMobile algorithm that efficiently extracts fine-grained local spatial details. …”
    Get full text
    Get full text
    Article
  2. 2

    A fast feature extraction algorithm for image and video processing by Abdulhussain, Sadiq H., Ramli, Abdul Rahman, Mahmmod, Basheera M., Saripan, M. Iqbal, Syed Mohamed, Syed Abdul Rahman Al-Haddad, Baker, Thar, Flayyih, Wameedh Nazar, Jassim, Wissam A.

    Published 2019
    “…These features are used to represent the local visual content of images and video frames. We compared the proposed method with the traditional approach of feature extraction using a standard image technique. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Pre-processing of input features using LPC and warping process by Sudirman, Rubita, Sh-Hussain, Salleh, Ming, Ting Chee

    Published 2005
    “…Another task is to align the input frames (test set) to the reference template (training set) using a modified DTW algorithm called DTW fixing frame (DTW-FF)algorithm. …”
    Get full text
    Get full text
    Article
  4. 4

    A simplified synchronous reference frame for indirect current controlled three-level inverter-based shunt active power filters by Hoon, Yap, Mohd Radzi, Mohd Amran, Hassan, Mohd Khair, Mailah, Nashiren Farzilah, Abdul Wahab, Noor Izzri

    Published 2016
    “…This paper presents a new simplified harmonics extraction algorithm based on the synchronous reference frame (SRF) for an indirect current controlled (ICC) three-level neutral point diode clamped (NPC) inverter-based shunt active power filter (SAPF). …”
    Get full text
    Get full text
    Article
  5. 5

    Image Stitching Of Aerial Footage by Ng, Wei Haen

    Published 2021
    “…In this project, an image stitching framework is proposed to take aerial footage as input data. The proposed algorithm extracts the frames of the aerial footage and undistorts the bird-eye-effect of the images to remove the noises. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6

    A new multi-frames watermarking technique for tamper detection and recovery by Khor, Hui Liang

    Published 2017
    “…The higher speed up factor in TALLOR indicated that the performance of the proposed multi-frames watermarking scheme is affected by the algorithm complexity of the adopted watermarking scheme and the number of frames in medical images processed.…”
    Get full text
    Get full text
    Thesis
  7. 7

    Parameter estimation and outlier detection in linear functional relationship model / Adilah Abdul Ghapor by Adilah, Abdul Ghapor

    Published 2017
    “…The simulation results indicate that the proposed method is suitable to detect a single outlier. As for the multiple outliers, a clustering algorithm is considered and a dendogram to visualise the clustering algorithm is used. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Application of weighted average on modal parameters for damage detection algorithms: Case study on steel beam by Fayyadh, M.M., Abdul Razak, H.

    Published 2011
    “…This study verifies the use of the proposed weighting method by Fayyadh and Abdul Razak (2011a) for damage detection algorithms applied on cracked steel beam. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9
  10. 10

    Improved TLBO-JAYA Algorithm for Subset Feature Selection and Parameter Optimisation in Intrusion Detection System by Aljanabi, Mohammad, Mohd Arfian, Ismail, Mezhuyev, Vitaliy

    Published 2020
    “…The proposed method combined the improved teaching-learning-based optimisation (ITLBO) algorithm, improved parallel JAYA (IPJAYA) algorithm, and support vector machine. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak by Dak, Ahmad Yusri

    Published 2019
    “…This creates the jamming detection and classification parameters. The second stage is detecting jammers by integrating both lower layers by developing Integrated Combined Layer Algorithm (ICLA). …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    NN with DTW-FF Coefficients and Pitch Feature for Speaker Recognition by Sudirman, Rubita, Salleh, Sh-Hussain, Salleh, Shaharuddin

    Published 2006
    “…The new feature processing used the modified version of traditional DTW called as DTW-FF algorithm to fix the input size so that the source and template frames have equal number of frames. …”
    Get full text
    Get full text
    Article
  14. 14

    Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems by Mohammad Khamees Khaleel, Alsajri

    Published 2022
    “…Most of the currently existing intrusion detection systems (IDS) use machine learning algorithms to detect network intrusion. …”
    Get full text
    Get full text
    Thesis
  15. 15

    HARMONIC MITIGATION USING SHUNT ACTIVE POWER FILTER BASED ON SYNCHRONOUS REFERENCE FRAME THEORY by Irdina Izzati, Abdul Harun

    Published 2023
    “…This project focuses on the design aspects of a three-phase Shunt Active Power Filter (SAPF) as an efficient harmonic mitigation device. The SAPF utilizes the synchronous reference frame theory and a hysteresis Proportional-Integral (PI) control algorithm to extract harmonic components and provide compensating currents. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  16. 16

    Improved intrusion detection algorithm based on TLBO and GA algorithms by Aljanabi, Mohammad, Mohd Arfian, Ismail

    Published 2021
    “…The NTLBO was proposed in this paper as an FSS mechanism; its algorithm-specific, parameter-less concept (which requires no parameter tuning during an optimization) was explored. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Outlier detection in circular regression model using minimum spanning tree method by Nur Faraidah, Muhammad Di, Siti Zanariah, Satari, Roslinazairimah, Zakaria

    Published 2019
    “…The existence of outliers in a circular regression model can lead to many errors, for example in inferences and parameter estimations. Therefore, this study aims to develop new algorithms that can detect outliers by using the minimum spanning tree method. …”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Comparison of UAV flying height parameter for crack detection applications / Wan Nurdayini Batrisyia Wan Ghazali by Wan Ghazali, Wan Nurdayini Batrisyia

    Published 2024
    “…The key concern of this thesis is to determine the influence of flying height parameters on crack detection using UAVs. Looking at the current scenario of development and the age of the structures in urban areas, there is a high significance of efficient and accurate building inspection methods. …”
    Get full text
    Get full text
    Student Project
  19. 19

    ANALYSIS OF CLASSIFICATION PROCESS FOR VIDEO SCENE UNDERSTANDING by MOHD RASHDAN, NURUL FARAH

    Published 2019
    “…The process starts with human action video obtained from KTH dataset as the input for video processing. In the frame process, important information will be extracted from the video images accordance to frame sequence where Spatial Temporal -Interest-Point (STIP) is used based on Harris’ Corner detection. …”
    Get full text
    Get full text
    Final Year Project
  20. 20

    Fuzzy modelling using butterfly optimization algorithm for phishing detection by Noor Syahirah, Nordin, Mohd Arfian, Ismail, Nurul Aswa, Omar

    Published 2020
    “…To generate the fuzzy parameter automatically, an optimization method is required and Butterfly Optimization Algorithm (BOA) is one of the good methods to be applied. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article