Search Results - (( frames classification modeling algorithm ) OR ( java application means algorithm ))

Refine Results
  1. 1

    ANALYSIS OF CLASSIFICATION PROCESS FOR VIDEO SCENE UNDERSTANDING by MOHD RASHDAN, NURUL FARAH

    Published 2019
    “…Scene understanding is a process observing scenes which humans are used as models to understand them. This project is focused on analyzing the classification process for video scene. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    A fuzzy approach for early human action detection / Ekta Vats by Ekta, Vats

    Published 2016
    “…In order to perform early human action detection, the conventional classification problem is modified into frame-by-frame level classification. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Enhanced emotion recognition in videos: a convolutional neural network strategy for human facial expression detection and classification by Ashraf, Arselan, Gunawan, Teddy Surya, Arifin, Fatchul, Kartiwi, Mira, Sophian, Ali, Habaebi, Mohamed Hadi

    Published 2023
    “…To address these issues, we propose a comprehensive CNN-based model for real-time detection and classification of five primary emotions: anger, happiness, neutrality, sadness, and surprise. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    CNN architectures for road surface wetness classification from acoustic signals by Bahrami, Siavash, Doraisamy, Shyamala, Azman, Azreen, Nasharuddin, Nurul Amelina, Yue, Shigang

    “…Recorded acoustic signals were segmented into equal frames and thirteen MFCCs were extracted for each frame to train the CNNs. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…The K-means algorithm has been around for over a century. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6

    Autism spectrum self-stimulatory behaviours classification using explainable temporal coherency deep networks and SVM classifier / Liang Shuaibing by Liang , Shuaibing

    Published 2022
    “…Meanwhile, it is often difficult to obtain good classification results using unlabelled data, further research to train a model that can obtain good classification results and at the same time being practical will be valuable. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…This study aims to compare the performance of Boyer-Moore, Knuth morris pratt, and Horspool algorithms in searching for the meaning of words in the Java-Indonesian dictionary search application in terms of accuracy and processing time. …”
    Get full text
    Get full text
    Journal
  9. 9

    Adaptive Non-Stationary Cardiac Signals Identification using an Augmented MLP Network by Asirvadam , Vijanth Sagayan, McLoone, Sean

    Published 2007
    “…In this paper hybrid form recursive training algorithms, which combines both linear and nonlinear orientation of weights, is being used to model or identify ElectroCardioGraphy (ECG) signals. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    A comparative study and simulation of object tracking algorithms by Ji, Yuanfa, Yin, Pan, Sun, Xiyan, Kamarul Hawari, Ghazali, Guo, Ning

    Published 2020
    “…This article introduces the popular object tracking algorithms, from common problems in object tracking to the classification of algorithms: Early classic trackingalgorithms, tracking algorithms based on kernel correlation filtering, and tracking algorithms based on deep learning. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11
  12. 12
  13. 13

    Biometrics electronic purse by Abdul Rahman, Abdul Wahab, Eng, Chong Tan, S., M. Heng

    Published 1999
    “…This paper looked into using biometrics as a mean of authentication, thus requiring a new generation of Smart Card technology to be implemented in banking and multiple applications environment. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  14. 14

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Plant disease detection using deep learning by Cheng, Jung Yin

    Published 2024
    “…However, when deploying these trained models on a central processing unit (CPU), YOLOv8 models consistently outperform ViT algorithms in terms of speed and accuracy. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  16. 16

    Enhanced mechanism to handle missing data of Hadith classifier by Aldhlan, Kawther A., Zeki, Ahmed M., Zeki, Akram M.

    Published 2011
    “…This research produced a mechanism to deal with missing data in Hadith database, 999 Hadiths from Sahih Al-Bukhari, Jami'u Al-Termithi and Selseelt AlaHadith Aldae'ifah w' Almadu'h were framed the sample of this study, the attributes of the hadith database were gained according to the validate methods of Hadith science, the experiment applied C4.5 algorithm to extract the rules of classification. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  17. 17
  18. 18
  19. 19

    Diagnosis security problems in cloud computing for business cloud by Shakir M., Abubakar A.B., Yousoff Y.B., Sagher A.M., Alkayali H.

    Published 2023
    “…The findings of this study, firstly the organizations or institutions are very concerned in improving the security of cloud computing through the application of the authority model and dynamic classification of data model based on the multi-level security. …”
    Article
  20. 20