Search Results - (( data detection matching algorithm ) OR ( java implication based algorithm ))

Refine Results
  1. 1

    Moving objects detection from UAV captured videos using trajectories of matched regional adjacency graphs by Harandi, Bahareh Kalantar Ghorashi

    Published 2017
    “…The proposed framework has also been compared with existing stateof- the-art detection algorithms. Experimental results show that MDMRBF outperforms these algorithms with precision and recall being 94% and 89%, respectively. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Adaptive template matching of photoplethysmogram pulses to detect motion artefact by Lim, Pooi Khoon, Ng, Siew Cheok, Lovell, Nigel Hamilton, Yu, Yong Poh, Tan, Maw Pin, McCombie, Devin, Lim, Einly, Redmond, Stephen James

    Published 2018
    “…The performance of our algorithm was evaluated using data obtained from two different sources: (i) our own data collected from 19 healthy subjects using the wearable Sotera Visi Mobile system (Sotera Wireless Inc.) as they performed various movement types; and (ii) ICU data provided by the PhysioNet MIMIC II database. …”
    Get full text
    Get full text
    Article
  3. 3

    Application Of Defect Detection In Gluing Line Using Shape-Based Matching Approach by Harun, Mohamad Haniff, Mohd Annuar, Khalil Azha, Noordin, Aminurrashid, Che Hasan, Mohd Hanif, Mohd Ab Halim, Mohd Firdaus, Saealal, Muhammad Salihin, Ibrahim, Muhammad Fareq

    Published 2015
    “…This paper investigates various approaches for automated inspection of gluing process using shape-based matching application. A new supervised defect detection approach to detect gap defect, bumper defect and bubble defect in gluing application is proposed. …”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Vehicle route tracking system based on vehicle registration number recognition using template matching algorithm by Lai, Chor Kiew, Md Muzahid, Abu Jafar, Kamarulzaman, Syafiq F.

    Published 2021
    “…The system utilizes a Template Matching Algorithm for recognition of the registration number and together with Global Positioning System information, a tracking system was develop. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Automatic counting of Paulownia trees using unmanned aerial vehicle images and template matching technique by S., Khairunniza-Bejo, W.M., Baqir-Mahdi, M., Nurhafizi-Zahari

    Published 2025
    “…Results have shown that the template matching with georeferencing data performed better compared with the template matching with the predetermined size of the template image. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    An estimation algorithm for improved maritime obstacle detection by Amir Alaqeb, Abdelrhman Mohamed, Rashid, Muhammad Mahbubur, Mohd Zaki, Hasan Firdaus, Embong, Abd Halim

    Published 2024
    “…A specialized ROS node facilitates data fusion by prioritizing ZED2I camera data, enhancing detection accuracy through comparisons with LiDAR data. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  7. 7
  8. 8

    Deviation detection in text using conceptual graph interchange format and error tolerance dissimilarity function by Kamaruddin, Siti Sakira, Hamdan, Abdul Razak, Abu Bakar, Azuraliza, Mat Nor, Fauzias

    Published 2012
    “…The rapid increase in the amount of textual data has brought forward a growing research interest towards mining text to detect deviations. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9
  10. 10

    Scalability and performance in duplicate detection : relational vs. graph database by Muhammad Farhad, Khaharruddin

    Published 2023
    “…However, Neo4J excels in exact duplicate and near-duplicate detection algorithms, showcasing its strength in handling complex, interconnected data structures. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  11. 11

    Hereditary ratio of adolescent to parent based on lips analysis using canny edge detection / Nor Shamimi Kharuddin by Kharuddin, Nor Shamimi

    Published 2010
    “…Canny edge detection is considered to be the ideal edge detection algorithm for images that are corrupted with white noise. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Innovative algorithm for easing VIP's navigation by avoiding obstacles and finding safe routes by Dooraki A.R., Hooshyar D., Yousefi M.

    Published 2023
    “…Big data; Bioinformatics; Computer vision; Image matching; Navigation; Obstacle detectors; Units of measurement; Autonomous Vehicles; Ground planes; Obstacle detection; RANSAC; Visually impaired persons; Algorithms…”
    Conference Paper
  13. 13

    Enhanced and effective parallel optical flow method for vehicle detection and tracking by Bhaskar, P.K., Yong, S.-P., Jung, L.T.

    Published 2016
    “…With a view to do improvements, it is proposed to develop an unique algorithm for vehicle data recognition and tracking using Parallel Optical Flow method based on Lucas-Kanade algorithm. …”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    An enhance embedding method using edge and textures detection for image steganography by Al-Maliki, Alaa Jabbar Qasim

    Published 2024
    “…The study utilized differential operators and filters to detect edges and textures in images, where data embedding is less perceptible. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Fuzzy Systems and Bat Algorithm for Exergy Modeling in a Gas Turbine Generator by Alemu Lemma, Tamiru, Mohd Hashim, Fakhruldin

    Published 2011
    “…The comparison between actual data from a different day and the prediction by the proposed method showed a match that is close enough to be considered as reliable. …”
    Get full text
    Conference or Workshop Item
  16. 16

    Tracking Pointer At Endoscopic Images For Telepointer Remote Guided by Muhamad Hamizi Zaidi, Mohd Jonhanis

    Published 2022
    “…Both methods have 100% accuracy in detecting and tracking the cursor. The proposed future cursor detection and tracking system should be capable of applying the proposed algorithm in a more complex environment and various input data.…”
    Get full text
    Get full text
    Undergraduates Project Papers
  17. 17

    Anomaly behavior detection using flexible packet filtering and support vector machine algorithms by Abdul Wahid, Mohammed N.

    Published 2016
    “…The main method is related to processing and filtering data packets using different types of packet filtering on network system and, more specifically, capturing and filtering data packets transmitted on high speed communications links for errors and attackers’ detection and signal integrity analysis. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    AUTONOMOUS MOBILE ROBOT VISION BASED SYSTEM: HUMAN DETECTION BY COLOR by Mohd Shah, Hairol Nizam, Ab Rashid, Mohd Zamzuri, Mohd Sobran, Nur Maisarah

    Published 2013
    “…One of the unique advantages in this project, the detection of human by color only uses image processing that generated by the algorithms itself without additional sensor like sonar or IF sensor.…”
    Get full text
    Get full text
    Article
  19. 19

    Cyclic redundancy encoder for error detection in communication channels by Khalifa, Othman Omran, Islam, Md. Rafiqul, Khan, Sheroz

    Published 2004
    “…The computed remainder, FCS is compared to the remainder received from the transmitter. If the two match, no errors have been detected in the message block. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  20. 20

    Network instrusion prevention system ( NIPS) based on network intrusion detection system (NIDS) and ID3 algorithm decision tree classifier by Syurahbil, A

    Published 2011
    “…Network security has gained significant attention in research and industrial communities.Due to the increasing threat of the network intrusion,firewalls have become important elements of the security policy.Firewall performance highly depends toward number of rules,because the large more rules the consequence makes downhill performance progressively.Firewall can be allow or deny access network packets incoming and outgoing into Local Area Network(LAN),but firewall can not detect intrusion.To distinguishing an intrusion network packet or normal is very difficult and takes a lot of time.An analyst must review all the network traffics previously.In this study,a new way to make the rules that can determine network packet is intrusion or normal automatically.These rules implemented into firewall as prevention,which if there is a network packet that match these rules then network packet will be dropped.This is called Network Intrusion Prevention System(NIPS).These rules are generated based on Network Intrusion Detection System(NIDS)and Iterative Dichotomiser 3 (ID3)Algorithm Decision Tree Classifier,which as data training is intrusion network packet and normal network packets from previous network traffics.The experiment is successful,which can generate the rules then implemented into a firewall and drop the intrusion network packet automatically.Moreover,this way can minimize number of rules in firewall.…”
    Get full text
    Get full text
    Thesis