Search Results - (( frames detection learning algorithm ) OR ( java implementation model algorithm ))

Refine Results
  1. 1

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Provider independent cryptographic tools by Ibrahim, Subariah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
    Get full text
    Get full text
    Get full text
    Monograph
  3. 3

    Particle swarm optimization with deep learning for human action recognition by Usmani, U.A., Watada, J., Jaafar, J., Aziz, I.A., Roy, A.

    Published 2021
    “…Also, the current motion target detection algorithms extract features from the relevant object only if the moving object has complex texture features. …”
    Get full text
    Get full text
    Article
  4. 4
  5. 5

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Overhead view based person counting using deep learning by Kaw, Chee Zhao

    Published 2022
    “…Third, the accurate tracking of each detected person is performed using the deep learning based tracking framework, known as DeepSORT. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  7. 7

    An integrated deep learning deepfakes detection method (IDL-DDM) by Yassin, Warusia, Johan, Azwan, Abas, Zuraida Abal, Baharon, Mohd Rizuan, Bejuri, Wan, Ismail, Anuar

    Published 2024
    “…The proposed IDL-DDM comprises side-by-side deep learning algorithms such as Multilayer Perceptron and Convolutional Neural Network (CNN). …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Fast shot boundary detection based on separable moments and support vector machine by Idan, Zinah N., Abdulhussain, Sadiq H., Mahmmod, Basheera M., Al-Utaibi, Khaled A., Syed Abdul Rahman Al-, Syed Abdul Rahman Al-Hadad, Sait, Sadiq M.

    Published 2021
    “…As a result, the computational cost is reduced in the subsequent stages. Finally, machine learning statistics based on the support vector machine is implemented to detect the cut transitions. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Deep learning object detector using a combination of Convolutional Neural Network (CNN) architecture (MiniVGGNet) and classic object detection algorithm by Ismail, Asmida, Ahmad, Siti Anom, Che Soh, Azura, Hassan, Mohd Khair, Harith, Hazreen Haizi

    Published 2020
    “…This paper presented an analysis performance of deep learning object detector by combining a deep learning Convolutional Neural Network (CNN) for object classification and applies classic object detection algorithms to devise our own deep learning object detector. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Optimization of blood vessel detection in retina images using multithreading and native code for portable devices by Tran, Duc Ngoc, Hussin, Fawnizu Azmadi, Yusoff, Mohd Zuki

    Published 2013
    “…The performance of Java programming model and native programming model are compared with respect to the execution time for blood vessel detection. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Vibration Signal for Bearing Fault Detection using Random Forest by Abedin T., Koh S.P., Yaw C.T., Phing C.C., Tiong S.K., Tan J.D., Ali K., Kadirgama K., Benedict F.

    Published 2024
    “…Based on the chosen properties of an induction motor, a random forest (RF) classifier, a machine learning technique, is examined in this study for bearing failure detection. …”
    Conference Paper
  12. 12

    Development of automatic obscene images filtering using deep learning by Awad, Abdelrahman Mohamed, Gunawan, Teddy Surya, Habaebi, Mohamed Hadi, Ismail, Nanang

    Published 2021
    “…This paper proposes a fully automated method to filter any storage device from obscene vid-eos and images using deep learning algorithms. The whole recognition process can be divided into two stages, including fine detection and focus detection. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Book Chapter
  13. 13

    Deep learning-based water segmentation for autonomous surface vessel by Mohd Adam, Muhammad Ammar, Ibrahim, Ahmad Imran, Zainal Abidin, Zulkifli, Mohd Zaki, Hasan Firdaus

    Published 2020
    “…Classical computer vision algorithms for detection holds limitation in robustness and scalability. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  14. 14

    Image processing based vehicle detection and tracking method by Bhaskar, P.K., Yong, S.-P.

    Published 2014
    “…First, we differentiate the foreground from background in frames by learning the background. Here, foreground detector detects the object and a binary computation is done to define rectangular regions around every detected object. …”
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Computer vision that can ‘see’ in the dark by Wong, Yan Chiew, Ahmad Radzi, Syafeeza, Goh, Shi Yong, Sarban Singh, Ranjit Singh

    Published 2024
    “…A hybrid model of integrating convolutional neural network (CNN) into YOLOv7 has been proposed. YOLOv7 is an algorithm designed for real-time object detection in image or video, for fast and accurate detection in applications such as autonomous vehicles and surveillance systems. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    A Toolkit for Simulation of Desktop Grid Environment by FOROUSHAN, PAYAM CHINI

    Published 2014
    “…A simulator for desktop grid environment has been developed using Java as the implementation language due to its wide popularity. …”
    Get full text
    Get full text
    Final Year Project
  17. 17
  18. 18
  19. 19

    A Model for Evaluation of Cryptography Algorithm on UUM Portal by Norliana, Abdul Majid

    Published 2004
    “…The methodology used in this study begun with problem identification, requirement identification, analysed the model process and design the simulation model. The simulation model was developed using Active Server Page, JavaScript and SQL 7.0 as database. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item