Search Results - (( using function based algorithm ) OR ( frames detection search algorithm ))

Refine Results
  1. 1

    Investigation of block matching algorithm for video coding by Faizul Hadi Mohamad Jamil

    Published 2013
    “…These techniques have been used to analyze the video frames quality with different Macroblock size and different sequence of I and P frame and also with different search ranges of block prediction. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    A New Approach of Optimal Search Solution in Particle Swarm Optimization (PSO) Algorithm for Object Detection Method by Zalili, Musa, Mohd Hafiz, Mohd Hassin, Nurul Izzatie Husna, Fauzi, Rohani, Abu Bakar, Watada, Junzo

    Published 2018
    “…Therefore, to overcome the several problems associated with the object detection method, a new approach in Particle Swarm Optimization (PSO) algorithm for optimal search solution as an alternative method to detect of object tracking quickly, precisely and accurately. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    An Improved Action Key Frames Extraction Algorithm for Complex Colour Video Shot Summarization by Mizher, Manar Abduljabbar Ahmad, Ang, Mei Choo, Sheikh Abdullah, Siti Norul Huda, Kok, Weng Ng

    Published 2019
    “…Key frame extraction is one of the critical techniques in computer vision fields such as video search, video identification and video forgeries detection. …”
    Get full text
    Get full text
    Article
  4. 4
  5. 5

    Tracking of moving athlete from video sequences using fower pollination algorithm by Ong, Pauline, Chong, Tang Keat, Ong, Kok Meng, Low, Ee Soong

    Published 2022
    “…The comparative analysis shows that the FPA is comparable with other competing algorithms in terms of detection rate, tracking accuracy and processing time.…”
    Get full text
    Get full text
    Get full text
    Article
  6. 6
  7. 7

    HSV-template matching with MEESPSO algorithm for human tracking in a crowded environment by Nurul Izzatie Husna, Fauzi, Zalili, Musa

    Published 2024
    “…To address these issues, we introduced a new approach combining HSV-template matching with the MEESPSO algorithm. In this approach, HSV-template matching continuously detects the target object in sequence images, while the Midrange Exploration Exploitation Searching Particle Swarm Optimization (MEESPSO) algorithm searches for the target location in the frames. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Lane markings detection based on e-maxima transformation and improved hough by Xiao, Rui

    Published 2012
    “…A short segment of a long curve with a relatively low curvature is approximated as a straight line, based on this point, the important contribution of this thesis presents a lane detection algorithm using E-MAXIMA transformation and improved Hough transform which is the algorithm with great efficiency, high robustness and also at low cost to detect road lane markings. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Improving performance of automated coronary arterial tree center-line extraction, stent localization and tracking by Boroujeni, Farsad Zamani

    Published 2012
    “…The first contribution is automatic detection of seed points which serve as a prerequisite step for centerline extraction algorithm. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Video Tracking System Using Midrange Exploration Exploitation Searching-Particle Swarm Optimization (MEESPSO) in handling occlusion and similar appearance due to crowded environmen... by Nurul Izzatie Husna, Fauzi, Zalili, Musa, Nor Saradatul Akmar, Zulkifli

    Published 2021
    “…In addition, the usage of conventional method still brings the limitation in term of the accuracy and precision of the detected object. Besides, the process of object tracking in an individual frame is also challenging due to the problems such as occlusion, crowded environment, and similar appearance Therefore, a Midrange Exploration Exploitation Searching Particle Swarm Optimization (MEESPSO) algorithm with color-shape feature pattern matching methods was introducing to address the problem of the similar appearance or color that comes close to target object in crowded environment, and the presence of occlusion problem cause motion of the crowded object or the camera views. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Obstacle detection technique using multi sensor integration for small unmanned aerial vehicle by Ramli, Muhammad Faiz, Shamsudin, Syariful Syafiq, Legowo, Ari

    Published 2017
    “…A small Lidar sensor is used as the initial detector and queue for image capturing by the camera. Next, SURF algorithm is applied to find the obstacle sizes estimation by searching the connecting feature points in the image frame. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Gravitational search – bat algorithm for solving single and bi-objective of non-linear functions by Abbas, Iraq Tareq

    Published 2018
    “…The BOGS-BAT algorithm is based on three techniques. The first technique is to move or switch solution from single function to functions that contain more than one objective functions. …”
    Get full text
    Get full text
    Thesis
  13. 13

    A block cipher based on genetic algorithm by Zakaria, Nur Hafiza

    Published 2016
    “…In many algorithms which are based on the genetic algorithm approach, diffusion properties using crossover and mutation function are being generated to produce a secure data transmission. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    FaaSBid: an auction-based model for Function as a Service in edge-fog environments using unallocated resources by Al-Qadhi, Abdulrahman K., Athauda, Rukshan, Latip, Rohaya, Hussin, Masnida

    Published 2026
    “…To initialise function placement, Fitness-Based Swap (FBSW) algorithm is proposed which places functions based on pre-defined information such as function size, function maximum execution time, and storage cost. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Abnormal event detection in video surveillance / Lim Mei Kuan by Lim, Mei Kuan

    Published 2014
    “…Therefore, by considering tracking as an optimisation problem, the proposed SwATrack algorithm searches for the optimal distribution of motion model without making prior assumptions, or prior learning of the motion model. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Computation of cryptosystem based on Lucas functions using addition chain by Md Ali, Zulkarnain, Othman, Mohamed, Md. Said, Mohamad Rushdan, Sulaiman, Md. Nasir

    Published 2010
    “…Cryptosystem based on Lucas Functions is known as LUC Cryptosystem. …”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Design and implementation of an object-following system by using DJI Tello drone by Noordin, Aminurrashid, Ahmad, Suziana, Ab Rahman, Azhan, Lam, Shu Xuan, Mohd Basri, Mohd Ariffanan, Mat Lazim, Izzuddin, Khalifa, Mustafa Saad

    Published 2025
    “…By integrating the capabilities of the DJI Tello drone, advanced computer vision algorithms, and a robust control system, the proposed solution demonstrates potential to enhance UAV applications in disaster management, emergency response, and search and rescue operations.…”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    An improved fast scanning algorithm based on distance measure and threshold function in region image segmentation by Ismael, Ahmed Naser

    Published 2016
    “…Hence, this study proposes an Improved Fast Scanning algorithm that is based on Sorensen distance measure and adaptive threshold function. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Enhancing speed performance of the cryptographic algorithm based on the lucas sequence by M. Abulkhirat, Esam

    Published 2003
    “…Utilizing the properties of Lucas functions introduced a public key system based on Lucas functions instead of exponentiation, which offer a good alternative to the most publicly used exponential public key system RSA. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Image encryption algorithm based on chaotic mapping by Salleh, Mazleena, Ibrahim, Subariah, Isnin, Ismail Fauzi

    Published 2003
    “…HVT function is based on a two-dimensional chaotic map that utilized Baker’s map algorithm. …”
    Get full text
    Get full text
    Get full text
    Article