Search Results - (( frame location detection algorithm ) OR ( java implementation using algorithm ))

Refine Results
  1. 1

    An Algorithm for Vehicle Detection and Tracking by Malik , Aamir Saeed

    Published 2010
    “…In this paper, we propose a vehicle detection and tracking algorithm. The detection is done using the median filtering and blob extraction. …”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    Ulcer detection and classification of wireless capsule endoscopy images using RGB masking by Suman, S., Hussi, F.A., Nicolas, W., Malik, A.S.

    Published 2016
    “…Therefore, it would be extremely advantageous to develop an intelligent algorithm to inspect the WCE images. This research aims to develop an algorithm to enhance wireless capsule endoscopy images and analyses them to detect Ulcer located in small intestine. …”
    Get full text
    Get full text
    Article
  3. 3

    Ulcer detection and classification of wireless capsule endoscopy images using RGB masking by Suman, S., Hussi, F.A., Nicolas, W., Malik, A.S.

    Published 2016
    “…Therefore, it would be extremely advantageous to develop an intelligent algorithm to inspect the WCE images. This research aims to develop an algorithm to enhance wireless capsule endoscopy images and analyses them to detect Ulcer located in small intestine. …”
    Get full text
    Get full text
    Article
  4. 4

    Damage detection in frame structures using noisy accelerometers and Damage Load Vectors (DLV) by Toloue, I., Liew, M.S., Hamonangan Harahap, I.S., Lee, H.E.

    Published 2020
    “…The DLV method was subsequently employed to locate the damaged members using recorded frame vibration data that were obtained from 'noisy' accelerometers positioned on the frame at eight predefined locations. …”
    Get full text
    Get full text
    Article
  5. 5

    Damage detection in frame structures using noisy accelerometers and Damage Load Vectors (DLV) by Toloue, I., Liew, M.S., Hamonangan Harahap, I.S., Lee, H.E.

    Published 2020
    “…The DLV method was subsequently employed to locate the damaged members using recorded frame vibration data that were obtained from 'noisy' accelerometers positioned on the frame at eight predefined locations. …”
    Get full text
    Get full text
    Article
  6. 6

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  7. 7
  8. 8

    A New Approach of Optimal Search Solution in Particle Swarm Optimization (PSO) Algorithm for Object Detection Method by Zalili, Musa, Mohd Hafiz, Mohd Hassin, Nurul Izzatie Husna, Fauzi, Rohani, Abu Bakar, Watada, Junzo

    Published 2018
    “…The main challenges are using the conventional method is the uncertainty in the accuracy and precision of the detected object motion. Furthermore, the process of detected an object in every frame is time consuming as the entire frame must be detected to precisely locate the object system. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    EMBEDDED PRESENTER TRACKING SYSTEM by MUSA, FAIZ SYAUQI

    Published 2018
    “…A webcam is used for the prototype to provide visual input for the system before the Viola-Jones algorithm is used to detect the presence of a human face within the video frame input. …”
    Get full text
    Get full text
    Final Year Project
  10. 10

    Improved abnormal detection using self-adaptive social force model for visual surveillance by Wan Nur Azhani, W. Samsudin

    Published 2017
    “…These particles are then advected to a new location according to its underlying optical flow vector at the current location. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Provider independent cryptographic tools by Ibrahim, Subariah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
    Get full text
    Get full text
    Get full text
    Monograph
  12. 12

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Performance evaluation on mitral valve motion feature tracking using kanade-lucas-Tomasi (KLT) algorithm based eigenvalue measurement by Mahadi, Lina Farhana, Ibrahim, Nabilah, Zaluwi, Mohd Thariq, S.M Johan, Muhammad Haniff

    Published 2019
    “…This paper discussed about the implementation of Kanade-Lucas-Tomasi (KLT) algorithm for automatic detection of the mitral valve in video frames. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Performance evaluation on mitral valve motion feature tracking using Kanade-Lucas- Tomasi (KLT) algorithm based eigenvalue measurement by Mahadi, Lina Farhana, Ibrahim, Nabilah, Zaluwi, Mohd Thariq, S.M Johan, Muhammad Haniff

    Published 2019
    “…This paper discussed about the implementation of Kanade-Lucas-Tomasi (KLT) algorithm for automatic detection of the mitral valve in video frames. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Enhanced and effective parallel optical flow method for vehicle detection and tracking by Bhaskar, P.K., Yong, S.-P., Jung, L.T.

    Published 2016
    “…Here, Motion detection is determined by temporal differencing and template matching is done only on the locations as guided by the motion detection stage to provide a robust target-tracking method. …”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17
  18. 18

    Performance evaluation of real-time multiprocessor scheduling algorithms by Alhussian, H., Zakaria, N., Abdulkadir, S.J., Fageeri, S.O.

    Published 2016
    “…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Front yard surveillance system: robbery scene detection by Tang, Jia Le

    Published 2020
    “…First YOLO will start to detect human and car present in the video frame and store its location. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  20. 20

    Automatic Number Plate Recognition on android platform: With some Java code excerpts by ., Abdul Mutholib, Gunawan, Teddy Surya, Kartiwi, Mira

    Published 2016
    “…On the other hand, the traditional algorithm using template matching only obtained 83.65% recognition rate with 0.97 second processing time. …”
    Get full text
    Get full text
    Get full text
    Book