Search Results - (( frames detection matching algorithm ) OR ( java application interface algorithm ))

Refine Results
  1. 1

    Moving objects detection from UAV captured videos using trajectories of matched regional adjacency graphs by Harandi, Bahareh Kalantar Ghorashi

    Published 2017
    “…This thesis therefore proposes a framework to address these issues through a two-step approach involving region matching and region labeling. Specifically, the objectives of this thesis are (i) to develop an image registration technique based on multigraph matching, (ii) to detect occluded objects through exploration of candidate object correspondences in longer frame sequences, and (iii) to develop a robust graph coloring algorithm for multiple moving object detection under different transformations. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Video surveillance: Item monitoring against theft by Chong, Yiing Sheah

    Published 2023
    “…After that, the system will get the current frame to find the common features with the background frame by using a feature matching algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  3. 3

    Investigation of block matching algorithm for video coding by Faizul Hadi Mohamad Jamil

    Published 2013
    “…The temporal model deals with motion estimation (ME) and motion compensation (MC) algorithm with the matching technique called “Block Matching Algorithm” (BMA) to produce the next encoded video frame with motion vector. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    A framework for multiple moving objects detection in aerial videos by Kalantar, Bahareh, Abdul Halin, Alfian, Al-Najjar, Husam Abdulrasool H., Mansor, Shattri, Genderen, John L. Van, M. Shafri, Helmi Zulhaidi, Zand, Mohsen

    Published 2019
    “…This representation is important for correspondence discovery between consecutive frames based on multigraph matching. Ultimately, each region is labeled as either a background or foreground (object) using a proposed graph-coloring algorithm. …”
    Get full text
    Get full text
    Get full text
    Book Section
  5. 5

    HSV-template matching with MEESPSO algorithm for human tracking in a crowded environment by Nurul Izzatie Husna, Fauzi, Zalili, Musa

    Published 2024
    “…To address these issues, we introduced a new approach combining HSV-template matching with the MEESPSO algorithm. In this approach, HSV-template matching continuously detects the target object in sequence images, while the Midrange Exploration Exploitation Searching Particle Swarm Optimization (MEESPSO) algorithm searches for the target location in the frames. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Enhanced and effective parallel optical flow method for vehicle detection and tracking by Bhaskar, P.K., Yong, S.-P., Jung, L.T.

    Published 2016
    “…Here, Motion detection is determined by temporal differencing and template matching is done only on the locations as guided by the motion detection stage to provide a robust target-tracking method. …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    SURF algorithm-based panoramic image mosaic application by Watada, J., Zhang, H., Melo, H., Wang, J., Vasant, P.

    Published 2018
    “…Image mosaics also can be used in moving object detection with a dynamic camera. After getting the panoramic background of the video for detection, we can compare every frame in the video with the panoramic background, and finally detect the moving object. …”
    Get full text
    Get full text
    Article
  8. 8

    SURF algorithm-based panoramic image mosaic application by Watada, J., Zhang, H., Melo, H., Wang, J., Vasant, P.

    Published 2018
    “…Image mosaics also can be used in moving object detection with a dynamic camera. After getting the panoramic background of the video for detection, we can compare every frame in the video with the panoramic background, and finally detect the moving object. …”
    Get full text
    Get full text
    Article
  9. 9

    Image Stitching Of Aerial Footage by Ng, Wei Haen

    Published 2021
    “…ScaleInvariant Feature Transform (SIFT) approach is used to detect and describe the feature points of the extracted frames. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  10. 10

    Cyclic redundancy encoder for error detection in communication channels by Khalifa, Othman Omran, Islam, Md. Rafiqul, Khan, Sheroz

    Published 2004
    “…The computed remainder, FCS is compared to the remainder received from the transmitter. If the two match, no errors have been detected in the message block. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  11. 11

    Real-time algorithmic music composition application. by Yap, Alisa Yi Hui

    Published 2022
    “…In addition, the system also utilises JavaFx and jFugue for its graphical user interface and music programming respectively. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  12. 12

    Application-Programming Interface (API) for Song Recognition Systems by Murtadha Arif Sahbudin, Chakib Chaouch, Salvatore Serrano

    Published 2024
    “…In addition the implementation is done by algorithm using Java’s programming language, executed through an application developed in the Android operating system. …”
    Article
  13. 13

    Passive Client-Centric Rogue Access Point Detection Framework For WiFi Hotspots by Ahmad, Nazrul Muhaimin

    Published 2018
    “…The proliferation of Wi-Fi hotspots in public places provides seamless Internet connectivity anywhere at any time to the wireless clients.Although many hotspots are often unprotected,unmanaged and unencrypted,this does not prevent the clients from actively connecting to the network.The underlying problem is that the network Access Point (AP) is always trusted.The adversary can impersonate a legitimate AP by setting up a rogue AP to commit espionage and to launch evil-twin attack,session hijacking,and eavesdropping.To aggravate the threats, existing detection solutions are ill-equipped to safeguard the client against rogue AP.Infrastructure- centric solutions are heavily relied on the deployment of sensors or centralized server for rogue AP detection, which are limited,expensive and rarely to be implemented in hotspots.Even though client-centric solutions offer threat-aware protection for the client,but the dependency of the existing solutions on the spoofable contextual network information and the necessity to be associated with the network makes those solutions are not viable for the hotspot’s client.Hence,this work proposes a framework of passive client-centric rogue AP detection for hotspots.Unlike existing solutions,the key idea is to piggyback AP-specific and network-specific information in IEEE 802.11 beacon frame that enables the client to perform the detection without authentication and association to any AP.Based on the spatial fingerprints included in the broadcasted information from the APs in the vicinity of the client,this work discloses a novel concept that enables the rogue AP detection via the client’s ability to self-colocalize and self-validate its own position in the hotspot.The legitimacy of the APs in the hotspot,in this view,lies in the fact that the correct matching between the Received Signal Strength Indicator (RSSI) measurements at the client and pre-recorded fingerprints is attainable when the beacons are transmitted only from the legitimate APs.Hence,any anomalousness in AP’s beacon frame or any attempt to replay the legitimate AP’s beacon frame from different location can be detected and classified as rogue AP threats.Through experiments in real environment,the results demonstrate that with proper algorithm selection and parameters tuning,the rogue AP detection framework can achieve over 90% detection accuracy in classifying the absence and presence of rogue AP threats in the hotspot.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Antenna arrays in multi-user detection of spread spectrum signals by Karim, M.R., Wei, S.

    Published 2007
    “…If these codes are not mutually orthogonal, the resulting multiple access interference (MAI) causes frame error rates to be unacceptably high. A number of multi-user detection algorithms have been suggested by various authors. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Visdom: Smart guide robot for visually impaired people by Lee, Zhen Ting

    Published 2025
    “…The system architecture integrates ROS 2 on a Raspberry Pi, with TCP/IP connectivity enabling remote operation. An Android mobile application, developed using Java and the java.net.Socket library, provides an intuitive and accessible user interface for seamless interaction with the robot. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  16. 16

    Visdom: Smart guide robot for visually impaired people by Lee, Zhen Ting

    Published 2025
    “…The system architecture integrates ROS 2 on a Raspberry Pi, with TCP/IP connectivity enabling remote operation. An Android mobile application, developed using Java and the java.net.Socket library, provides an intuitive and accessible user interface for seamless interaction with the robot. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  17. 17
  18. 18
  19. 19

    Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework by Asaad Aref, Ibrahim

    Published 2004
    “…A design proposal was outlined to provide an adaptive client/server approach to stream audio contents using Real-Time Transport Protocol (RTP) involving architecture based on the Java Media Framework (JMF) Application Programmable Interfaces (API).RTP protocol is the Internet-standard protocol for the transport of real-time data, including audio and video and can be implemented by using Java Media Framework (JMF). …”
    Get full text
    Get full text
    Thesis
  20. 20