Search Results - (( pattern detection path algorithm ) OR ( frames selection based algorithm ))
Search alternatives:
- pattern detection »
- frames selection »
- selection based »
- detection path »
- path algorithm »
-
1
A generalized laser simulator algorithm for optimal path planning in constraints environment
Published 2022“…The suggested algorithm outperforms the competition in terms of improving path cost, smoothness, and search time. …”
Get full text
Thesis -
2
Animal voice recognition for identification (ID) detection system
Published 2011“…In this paper, an animal identification (ID) detection system based on animal voice pattern recognition algorithm has been developed. …”
Get full text
Get full text
Conference or Workshop Item -
3
Dog voice identification (ID) for detection system
Published 2012“…In this paper, an animal identification (ID) detection system based on animal voice pattern recognition algorithm has been developed. …”
Get full text
Get full text
Conference or Workshop Item -
4
An Improved Action Key Frames Extraction Algorithm for Complex Colour Video Shot Summarization
Published 2019“…The objective of this work is to improve our previous action key frames extraction algorithm (AKF) by adapting a threshold which selects action key frames as final key frames. …”
Get full text
Get full text
Article -
5
Variable block based motion estimation using hexagon diamond full search algorithm (HDFSA) via block subtraction technique
Published 2015“…The variable block matching developed based on four stages which is the video and frame selection, threshold calculation, block size selection and search pattern. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
6
Eccentricity Optimization of NGB System by using Multi-Objective Genetic Algorithm
Published 2009“…Based on the plain aggregate approaches for transforming the objective vector in scalar, some modifications are proposed to assist designers in making decision on prioritizing between the frame stiffness and brace frame weight in their design.…”
Get full text
Get full text
Article -
7
Optimum Colour Space Selection for Ulcerated Regions using Statistical Analysis and Classification of Ulcerated Frames from WCE Video Footage
Published 2015“…This paper proposes an ulcerated frame detection method based on RGB and CIE Lab colour spaces. …”
Get full text
Get full text
Conference or Workshop Item -
8
Feature extraction: hand shape, hand position and hand trajectory path
Published 2011Get full text
Get full text
Get full text
Book Chapter -
9
Optimum Colour Space Selection for Ulcerated Regions Using Statistical Analysis and Classification of Ulcerated Frames from WCE Video Footage
Published 2015“…This paper proposes an ulcerated frame detection method based on RGB and CIE Lab colour spaces. …”
Get full text
Get full text
Book Section -
10
WA VELET-DCT BASED IMAGE CODER FOR VIDEO CODING APPLICATIONS
Published 2008“…The simulation was developed using SIMULINK and MATLAB. WaveletDCT based intra-frame coder was simulated by employing two different approaches. …”
Get full text
Get full text
Final Year Project -
11
Frame selection based on modified entropy and object motion for secured data hiding in videos
Published 2021“…This research proposed a frame selection technique based on object motion and modified entropy in video steganography. …”
Get full text
Get full text
Thesis -
12
A new stepsize for gradient method via weak secant equation
Published 2007“…The algorithm then selects the stepsizes along the negative gradient using a new approximation of the Hessian based on the weak secant equation. …”
Get full text
Conference or Workshop Item -
13
Image classification using two dimensional wavelet coefficients with parallel computing
Published 2020“…Whenever an area with the similar characteristic is verified in the next frame, the area will be identified and bounded with a rectangle through the object recognition algorithm of the research. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
14
Fast shot boundary detection based on separable moments and support vector machine
Published 2021“…The proposed SBD framework is based on the concept of candidate segment selection with frame active area and separable moments. …”
Get full text
Get full text
Get full text
Article -
15
Video surveillance: Item monitoring against theft
Published 2023“…After that, the system will get the current frame to find the common features with the background frame by using a feature matching algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
16
Grouping based radio frequency identification anti-collision protocols for dense internet of things application
Published 2022“…This paper analyzes selected grouping-based algorithms. Their underlining principles are discussed including their tag estimation methods. …”
Get full text
Get full text
Article -
17
Adopting acknowledgment bitmap as an implicit indicator of the IEEE802.11n wireless network state
Published 2015“…In frame aggregation multiple frames are combined and then sent. …”
Get full text
Get full text
Get full text
Article -
18
Automated threshold detection for object segmentation in colour image
Published 2016“…The procedure starts with selection of optimal RGB channel. Then H(•) algorithm is applied for automated threshold detection to convert the image frames into grayscale image. …”
Get full text
Get full text
Get full text
Get full text
Article -
19
Dealing with Routing Hole Problem in Multi-hop Hierarchical Routing Protocol in Wireless Sensor Network
Published 2019“…In the proposed work, the focused problem is how to reduce the communication energy consumption and to avoid the routing hole problem by optimized routing algorithms. First, a routing hole detection algorithm is proposed prior to designing the routing protocol which decreases about 30 percent energy consumption rate, detection time and detection overhead. …”
Get full text
Get full text
Thesis -
20
Machine Learning Based Detection for Compromised Accounts on Social Media Networks
Published 2025“…Behavioral features include changes in posting frequency, interaction patterns, and location data. We employ machine learning algorithms to train models that can accurately classify accounts as compromised or legitimate based on these features. …”
Get full text
Get full text
Get full text
Get full text
Article
