Search Results - (( pattern detection method algorithm ) OR ( _ interaction method algorithm ))
Search alternatives:
- interaction method »
- pattern detection »
- method algorithm »
- _ interaction »
-
1
Analytical method for forensic investigation of social networking applications on smartphones
Published 2016“…The identified patterns are then used to design an algorithm for detecting social networking data remnants automatically. …”
Get full text
Get full text
Get full text
Thesis -
2
Hereditary ratio of adolescent to parent based on lips analysis using canny edge detection / Nor Shamimi Kharuddin
Published 2010“…This process significantly reduces the amount of data in the image, while preserving the most important structural features of that image. Canny edge detection is considered to be the ideal edge detection algorithm for images that are corrupted with white noise. …”
Get full text
Get full text
Thesis -
3
Human Spontaneous Emotion Detection System
Published 2018“…Having smart computerized system which can understand and instantly gives appropriate response to human is the utmost motive in human and computer interaction (HCI) field.It is argued either HCI is considered advance if human could not have natural and comfortable interaction like human to human interaction.Besides,despite of several studies regarding emotion detection system, current system mostly tested in laboratory environment and using mimic emotion.Realizing the current system research lack of real life or genuine emotion input,this research work comes up with the idea of developing a system that able to recognize human emotion through facial expression.Therefore,the aims of this study are threefold which are to enhance the algorithm to detect spontaneous emotion,to develop spontaneous facial expression database and to verify the algorithm performance.This project used Matlab programming language,specifically Viola Jones method for features tracking and extraction,then pattern matching for emotion classification purpose.Mouth feature is used as main features to identify the emotion of the expression.For verification purpose,the mimic and spontaneous database which are obtained from internet,open source database or novel (own) developed databases are used.Basically,the performance of the system is indicated by emotion detection rate and average execution time.At the end of this study,it is found that this system is suitable for recognizing spontaneous facial expression (63.28%) compared to posed facial expression (51.46%).The verification even better for positive emotion with 71.02% detection rate compared to 48.09% for negative emotion detection rate.Finally,overall detection rate of 61.20% is considered good since this system can execute result within 3s and use spontaneous input data which known as highly susceptible to noise.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
4
Image segmentation method for boundary detection of breast thermography using random walkers
Published 2013“…Use of interactive segmentation can further enhance these results dramatically as all the standard images that were not segmented correctly by the automatically method were correctly segmented after the utilization of the interactive mode.…”
Get full text
Get full text
Thesis -
5
Feature extraction: hand shape, hand position and hand trajectory path
Published 2011“…Vision-based hand posture detection and tracking is an important issue for Human to Computer Interaction applications. …”
Get full text
Get full text
Get full text
Book Chapter -
6
Landslide susceptibility mapping using decision-tree based chi-squared automatic interaction detection (CHAID) and logistic regression (LR) integration
Published 2014“…This article uses methodology based on chi-squared automatic interaction detection (CHAID), as a multivariate method that has an automatic classification capacity to analyse large numbers of landslide conditioning factors. …”
Get full text
Get full text
Conference or Workshop Item -
7
A study on component-based technology for development of complex bioinformatics software
Published 2004“…Othman present a comprehensive method based on two-layer multiclass classifiers. …”
Get full text
Get full text
Monograph -
8
Liver segmentation on CT images using random walkers and fuzzy c-means for treatment planning and monitoring of tumors in liver cancer patients
Published 2017“…Based on the location of the lung, the liver dome is automatically detected and the liver is then extracted by random walkers method and refined using a fuzzy level set method. …”
Get full text
Get full text
Get full text
Thesis -
9
Mean of correlation method for optimization of affective states detection in children
Published 2018“…In this paper, a non-invasive, contactless, and less distraction method is proposed to measure the physiological cues of the subjects using their thermal imprints from frontal face imaging. …”
Get full text
Get full text
Get full text
Get full text
Article -
10
Feature Extraction and Matching from images / lntan Syaherra Ramli
Published 2023“…This is a fundamental task for many applications such as 30 point cloud reconstruction and pattern recognition. In this task, feature extraction is used to detect the unique feature point from the images. …”
Get full text
Get full text
Monograph -
11
Machine Learning Based Detection for Compromised Accounts on Social Media Networks
Published 2025“…Behavioral features include changes in posting frequency, interaction patterns, and location data. We employ machine learning algorithms to train models that can accurately classify accounts as compromised or legitimate based on these features. …”
Get full text
Get full text
Get full text
Get full text
Article -
12
Abnormal Pattern Detection In Ppg Signals Using Time Series Analysis
Published 2022“…This project’s objectives are to implement rule-based algorithm method for abnormal pattern detection in PPG signals, and to investigate the accuracy and performance of rule-based algorithm in detecting the abnormal pattern. …”
Get full text
Get full text
Undergraduates Project Papers -
13
Face emotion recognition using artificial intelligence techniques
Published 2008“…The acquired images have gone through few preprocessing methods. The edge detection has to be successful even when the intensity of light is uneven. …”
Get full text
Thesis -
14
-
15
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
Get full text
Get full text
Thesis -
16
-
17
A study on advanced statistical analysis for network anomaly detection
Published 2005“…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
Get full text
Monograph -
18
Autonomous anomaly detection using density-based features in streaming data / Muhammmad Yunus Iqbal Basheer
Published 2023“…Hence, it is critical for an anomaly detection algorithm to detect data anomalies patterns. …”
Get full text
Get full text
Thesis -
19
Classification and detection of intelligent house resident activities using multiagent
Published 2013“…The intelligent home research requires understanding of the human behavior and recognizing patterns of activities of daily living (ADL).However instead of understand the psychosomatic nature of human early projects in this area simply employed intelligence to the household appliance.This paper proposed an algorithm for detecting ADL.The proposed method is based on two opposite state entity extraction.The method reflects on the common data flow of smart home event sequence.The developed algorithm clusters the smart home events by isolating opposite status of home appliance. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Wifi-based location-independent human activity recognition and localization using deep learning
Published 2024“…Detecting human activities holds paramount significance across diverse domains, encompassing healthcare, security, autonomous driving, and human-computer interaction. …”
Get full text
Get full text
Get full text
Thesis
