Search Results - (( frames detection learning algorithm ) OR ( java implementation _ algorithm ))

Refine Results
  1. 1

    Particle swarm optimization with deep learning for human action recognition by Usmani, U.A., Watada, J., Jaafar, J., Aziz, I.A., Roy, A.

    Published 2021
    “…Also, the current motion target detection algorithms extract features from the relevant object only if the moving object has complex texture features. …”
    Get full text
    Get full text
    Article
  2. 2
  3. 3

    Overhead view based person counting using deep learning by Kaw, Chee Zhao

    Published 2022
    “…Third, the accurate tracking of each detected person is performed using the deep learning based tracking framework, known as DeepSORT. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  4. 4

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…Today, with online marketing, banking, healthcare and other services, even the average householder is aware of encryption. The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  5. 5

    An integrated deep learning deepfakes detection method (IDL-DDM) by Yassin, Warusia, Johan, Azwan, Abas, Zuraida Abal, Baharon, Mohd Rizuan, Bejuri, Wan, Ismail, Anuar

    Published 2024
    “…The proposed IDL-DDM comprises side-by-side deep learning algorithms such as Multilayer Perceptron and Convolutional Neural Network (CNN). …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Fast shot boundary detection based on separable moments and support vector machine by Idan, Zinah N., Abdulhussain, Sadiq H., Mahmmod, Basheera M., Al-Utaibi, Khaled A., Syed Abdul Rahman Al-, Syed Abdul Rahman Al-Hadad, Sait, Sadiq M.

    Published 2021
    “…As a result, the computational cost is reduced in the subsequent stages. Finally, machine learning statistics based on the support vector machine is implemented to detect the cut transitions. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Deep learning object detector using a combination of Convolutional Neural Network (CNN) architecture (MiniVGGNet) and classic object detection algorithm by Ismail, Asmida, Ahmad, Siti Anom, Che Soh, Azura, Hassan, Mohd Khair, Harith, Hazreen Haizi

    Published 2020
    “…This paper presented an analysis performance of deep learning object detector by combining a deep learning Convolutional Neural Network (CNN) for object classification and applies classic object detection algorithms to devise our own deep learning object detector. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Vibration Signal for Bearing Fault Detection using Random Forest by Abedin T., Koh S.P., Yaw C.T., Phing C.C., Tiong S.K., Tan J.D., Ali K., Kadirgama K., Benedict F.

    Published 2024
    “…Based on the chosen properties of an induction motor, a random forest (RF) classifier, a machine learning technique, is examined in this study for bearing failure detection. …”
    Conference Paper
  9. 9

    Development of automatic obscene images filtering using deep learning by Awad, Abdelrahman Mohamed, Gunawan, Teddy Surya, Habaebi, Mohamed Hadi, Ismail, Nanang

    Published 2021
    “…This paper proposes a fully automated method to filter any storage device from obscene vid-eos and images using deep learning algorithms. The whole recognition process can be divided into two stages, including fine detection and focus detection. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Book Chapter
  10. 10

    Deep learning-based water segmentation for autonomous surface vessel by Mohd Adam, Muhammad Ammar, Ibrahim, Ahmad Imran, Zainal Abidin, Zulkifli, Mohd Zaki, Hasan Firdaus

    Published 2020
    “…Classical computer vision algorithms for detection holds limitation in robustness and scalability. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  11. 11

    Provider independent cryptographic tools by Ibrahim, Subariah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
    Get full text
    Get full text
    Get full text
    Monograph
  12. 12

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  13. 13

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Image processing based vehicle detection and tracking method by Bhaskar, P.K., Yong, S.-P.

    Published 2014
    “…First, we differentiate the foreground from background in frames by learning the background. Here, foreground detector detects the object and a binary computation is done to define rectangular regions around every detected object. …”
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Computer vision that can ‘see’ in the dark by Wong, Yan Chiew, Ahmad Radzi, Syafeeza, Goh, Shi Yong, Sarban Singh, Ranjit Singh

    Published 2024
    “…A hybrid model of integrating convolutional neural network (CNN) into YOLOv7 has been proposed. YOLOv7 is an algorithm designed for real-time object detection in image or video, for fast and accurate detection in applications such as autonomous vehicles and surveillance systems. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    Performance evaluation of real-time multiprocessor scheduling algorithms by Alhussian, H., Zakaria, N., Abdulkadir, S.J., Fageeri, S.O.

    Published 2016
    “…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    A real-time mobile notification system for inventory stock out detection using SIFT and RANSAC by Merrad, Yacine, Habaebi, Mohamed Hadi, Islam, Md Rafiqul, Gunawan, Teddy Surya

    Published 2020
    “…It may mean the detection of an object within a frame and classify it (human, animal, vehicle, building, etc) by the use of some algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Automatic Number Plate Recognition on android platform: With some Java code excerpts by ., Abdul Mutholib, Gunawan, Teddy Surya, Kartiwi, Mira

    Published 2016
    “…The main challenges of implementing ANPR algorithm on mobile phone are how to produce a higher coding efficiency, lower computational complexity, and higher scalability. …”
    Get full text
    Get full text
    Get full text
    Book