Search Results - (( frames detection clustering algorithm ) OR ( java application customization algorithm ))

  • Showing 1 - 8 results of 8
Refine Results
  1. 1
  2. 2

    2D and 3D video scene text classification by Xu, J., Shivakumara, P., Lu, T., Tan, C.L.

    Published 2014
    “…In this paper, we propose a novel horizontal and vertical symmetry feature by calculating the gradient direction and the gradient magnitude of each text candidate, which results in Potential Text Candidates (PTCs) after applying the k-means clustering algorithm on the gradient image of each input frame to verify PTC , we explore temporal information of video by proposing an iterative process that continuously verifies the PTCs of the first frame and the successive frames, until the process meets the converging criterion. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Collective interaction filtering with graph-based descriptors for crowd behaviour analysis by Wong, Pei Voon

    Published 2018
    “…The group detection experiment is implemented using the clustering algorithm. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Collective interaction filtering approach for detection of group in diverse crowded scenes by Wong, Pei Voon, Mustapha, Norwati, Affendey, Lilly Suriani, Khalid, Fatimah

    Published 2019
    “…This approach is able to deduce people interaction with the Expectation-Maximization algorithm. The Collective Interaction Filtering approach accurately identifies groups by clustering trajectories in crowds with various densities, structures and occlusion of each other. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Development of mesoscopic imaging system for surface inspection / Moe Win by Moe , Win

    Published 2018
    “…Existing thresholding-based and clustering-based methods are tested and compared to achieve faster and more efficient algorithms. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item