Search Results - (( frames detection matching algorithm ) OR ( java application testing algorithm ))
Search alternatives:
- application testing »
- testing algorithm »
- frames detection »
- java application »
- matching »
-
1
Moving objects detection from UAV captured videos using trajectories of matched regional adjacency graphs
Published 2017“…This thesis therefore proposes a framework to address these issues through a two-step approach involving region matching and region labeling. Specifically, the objectives of this thesis are (i) to develop an image registration technique based on multigraph matching, (ii) to detect occluded objects through exploration of candidate object correspondences in longer frame sequences, and (iii) to develop a robust graph coloring algorithm for multiple moving object detection under different transformations. …”
Get full text
Get full text
Get full text
Thesis -
2
Video surveillance: Item monitoring against theft
Published 2023“…After that, the system will get the current frame to find the common features with the background frame by using a feature matching algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
3
Investigation of block matching algorithm for video coding
Published 2013“…The temporal model deals with motion estimation (ME) and motion compensation (MC) algorithm with the matching technique called “Block Matching Algorithm” (BMA) to produce the next encoded video frame with motion vector. …”
Get full text
Get full text
Get full text
Thesis -
4
A framework for multiple moving objects detection in aerial videos
Published 2019“…This representation is important for correspondence discovery between consecutive frames based on multigraph matching. Ultimately, each region is labeled as either a background or foreground (object) using a proposed graph-coloring algorithm. …”
Get full text
Get full text
Get full text
Book Section -
5
HSV-template matching with MEESPSO algorithm for human tracking in a crowded environment
Published 2024“…To address these issues, we introduced a new approach combining HSV-template matching with the MEESPSO algorithm. In this approach, HSV-template matching continuously detects the target object in sequence images, while the Midrange Exploration Exploitation Searching Particle Swarm Optimization (MEESPSO) algorithm searches for the target location in the frames. …”
Get full text
Get full text
Get full text
Article -
6
Enhanced and effective parallel optical flow method for vehicle detection and tracking
Published 2016“…Here, Motion detection is determined by temporal differencing and template matching is done only on the locations as guided by the motion detection stage to provide a robust target-tracking method. …”
Get full text
Get full text
Conference or Workshop Item -
7
SURF algorithm-based panoramic image mosaic application
Published 2018“…Image mosaics also can be used in moving object detection with a dynamic camera. After getting the panoramic background of the video for detection, we can compare every frame in the video with the panoramic background, and finally detect the moving object. …”
Get full text
Get full text
Article -
8
SURF algorithm-based panoramic image mosaic application
Published 2018“…Image mosaics also can be used in moving object detection with a dynamic camera. After getting the panoramic background of the video for detection, we can compare every frame in the video with the panoramic background, and finally detect the moving object. …”
Get full text
Get full text
Article -
9
Image Stitching Of Aerial Footage
Published 2021“…ScaleInvariant Feature Transform (SIFT) approach is used to detect and describe the feature points of the extracted frames. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
10
Cyclic redundancy encoder for error detection in communication channels
Published 2004“…The computed remainder, FCS is compared to the remainder received from the transmitter. If the two match, no errors have been detected in the message block. …”
Get full text
Get full text
Get full text
Proceeding Paper -
11
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
12
Passive Client-Centric Rogue Access Point Detection Framework For WiFi Hotspots
Published 2018“…The proliferation of Wi-Fi hotspots in public places provides seamless Internet connectivity anywhere at any time to the wireless clients.Although many hotspots are often unprotected,unmanaged and unencrypted,this does not prevent the clients from actively connecting to the network.The underlying problem is that the network Access Point (AP) is always trusted.The adversary can impersonate a legitimate AP by setting up a rogue AP to commit espionage and to launch evil-twin attack,session hijacking,and eavesdropping.To aggravate the threats, existing detection solutions are ill-equipped to safeguard the client against rogue AP.Infrastructure- centric solutions are heavily relied on the deployment of sensors or centralized server for rogue AP detection, which are limited,expensive and rarely to be implemented in hotspots.Even though client-centric solutions offer threat-aware protection for the client,but the dependency of the existing solutions on the spoofable contextual network information and the necessity to be associated with the network makes those solutions are not viable for the hotspot’s client.Hence,this work proposes a framework of passive client-centric rogue AP detection for hotspots.Unlike existing solutions,the key idea is to piggyback AP-specific and network-specific information in IEEE 802.11 beacon frame that enables the client to perform the detection without authentication and association to any AP.Based on the spatial fingerprints included in the broadcasted information from the APs in the vicinity of the client,this work discloses a novel concept that enables the rogue AP detection via the client’s ability to self-colocalize and self-validate its own position in the hotspot.The legitimacy of the APs in the hotspot,in this view,lies in the fact that the correct matching between the Received Signal Strength Indicator (RSSI) measurements at the client and pre-recorded fingerprints is attainable when the beacons are transmitted only from the legitimate APs.Hence,any anomalousness in AP’s beacon frame or any attempt to replay the legitimate AP’s beacon frame from different location can be detected and classified as rogue AP threats.Through experiments in real environment,the results demonstrate that with proper algorithm selection and parameters tuning,the rogue AP detection framework can achieve over 90% detection accuracy in classifying the absence and presence of rogue AP threats in the hotspot.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
13
Antenna arrays in multi-user detection of spread spectrum signals
Published 2007“…If these codes are not mutually orthogonal, the resulting multiple access interference (MAI) causes frame error rates to be unacceptably high. A number of multi-user detection algorithms have been suggested by various authors. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
-
15
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. …”
Get full text
Get full text
Journal -
16
Traffic surveillance: A review of vision based vehicle detection, recognition and tracking
Published 2024Article -
17
-
18
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
19
Collective interaction filtering with graph-based descriptors for crowd behaviour analysis
Published 2018“…The group detection experiment is implemented using the clustering algorithm. …”
Get full text
Get full text
Thesis -
20
Classification System for Heart Disease Using Bayesian Classifier
Published 2007“…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
Get full text
Get full text
Thesis
