Search Results - (( frames extraction between algorithm ) OR ( java application customization algorithm ))

Refine Results
  1. 1

    An improved method in speech signal input representation based on DTW technique for NN speech recognition system by Sudirman, Rubita, Salleh, Sh. Hussain, Salleh, Shaharuddin

    Published 2007
    “…The purpose of the new algorithm is to align the input frames in the test set to the template frames in the reference set. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Local DTW coefficients and pitch feature for back-propagation NN digits recognition by Sudirman, R., Salleh, Shahruddin Hussain, Salleh, Sh-Hussain

    Published 2006
    “…The LPC features vectors are aligned between the source frames to the template using our DTW frame fixing (DTW-FF) algorithm. …”
    Get full text
    Conference or Workshop Item
  3. 3

    AR oriented pose matching mechanism from motion capture data by Iqbal J., Sidhu M.S., Ariff M.B.M.

    Published 2023
    “…In order to extract the exact matched pose, the frame sequence is divided into pose feature frame and skeletal data frame by the use of pose matching dance training movement recognition algorithm (PMDTMR). …”
    Article
  4. 4

    Local DTW Coefficients and Pitch Feature for Back-Propagation NN Digits Recognition by Sudirman, Rubita, Salleh, Sh-Hussain, Salleh, Shaharuddin

    Published 2006
    “…The LPC features vectors are aligned between the source frames to the template using our DTW frame fixing (DTW-FF) algorithm. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Image Stitching Of Aerial Footage by Ng, Wei Haen

    Published 2021
    “…In this project, an image stitching framework is proposed to take aerial footage as input data. The proposed algorithm extracts the frames of the aerial footage and undistorts the bird-eye-effect of the images to remove the noises. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6

    Gender identification of children using hidden Markov model based on Mel-frequency cepstral coefficient / Adira Ibrahim by Adira, Ibrahim

    Published 2013
    “…Mel Frequency Cepstral Coefficient (MFCC) was applied as the feature extraction method. HMM was trained with Baum-Welch algorithm and tested with Viterbi algorithm to get the gender identification accuracy. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Development Of A Robust Blind Digital Video Watermarking Algorithm Using Discrete Wavelet Transform by Al-Deen, Ahmed A. Baha'a

    Published 2007
    “…On the other hand, a random key is used to choose the frames to be watermarked to increase the security level of the algorithm and discourage piracy. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Improving performance of automated coronary arterial tree center-line extraction, stent localization and tracking by Boroujeni, Farsad Zamani

    Published 2012
    “…The first contribution is automatic detection of seed points which serve as a prerequisite step for centerline extraction algorithm. The solution consists of an algorithm for automatic collection of candidate seed points using efficient grid line searching mechanism and a validation method which uses local geometric and intensity based features as effective validation rules to discriminate between the actual seed point and false alarms. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Video surveillance: Item monitoring against theft by Chong, Yiing Sheah

    Published 2023
    “…After that, the system will get the current frame to find the common features with the background frame by using a feature matching algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  10. 10

    Shunt active power filter with modified synchronous reference frame technique and fuzzy logic current controller for harmonic mitigation by Suleiman, Musa

    Published 2017
    “…From both results, the proposed algorithms show good performances when compared with the conventional algorithms. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Vision-Based Autonomous Vehicle Driving Control System by Isa, Khalid

    Published 2005
    “…In this subsystem, image-capturing techniques capture the video images frame by frame. After that, lane detection process extracts the information about vehicle position with respect to the highway lane. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Vision-based autonomous vehicle driving control system by Isa, Khalid

    Published 2005
    “…In this subsystem, image-capturing techniques capture the video images frame by frame. After that, lane detection process extracts the information about vehicle position with respect to the highway lane. …”
    Get full text
    Get full text
    Thesis
  14. 14

    A Reinforcement Learning Based Adaptive ROI Generation for Video Object Segmentation by Usmani, U.A., Watada, J., Jaafar, J., Aziz, I.A., Roy, A.

    Published 2021
    “…We take advantage of the inherent correlations between the video frames by incorporating a global co-attention mechanism to overcome the limitations. …”
    Get full text
    Get full text
    Article
  15. 15

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Algorithm of local features fusion and modified covariance-matrix technique for hand motion position estimation and hand gesture trajectory tracking approach by Thabet, Eman, Khalid, Fatimah, Sulaiman, Puteri Suhaiza, Yaakob, Razali

    Published 2020
    “…Hence, to tackle these difficulties and extract gesture features for gesture recognition phase accurately, this paper proposed an algorithm of dynamic hand trajectory tracking for gesture recognition. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Aggressive movement detection using optical flow features base on digital & thermal camera by Tan Zizi @ Tuan Zizi, Tuan Khalisah, Ramli, Suzaimah, Mohd Zainudin, Norulzahrah, Hasbullah, Nor Asiakin, Abdul Wahab, Norshariah, Mat Razali, Noor Afiza, Ibrahim, Norazlin

    Published 2017
    “…Previous research proposed an approach to figure out human aggressive features using Horn-Schunck optical flow algorithm in order to find the flow vector for all video frames using digital camera only. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Slam-based mapping for object recognition by Loh, Wan Ying

    Published 2018
    “…The SIFT (Scale-Invariant Feature Transform) is used to extract features from the current frame and match with the object database to identify and recognize the object whenever the robot come across the object. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  19. 19

    Analysis of performance between kinect v1 and kinect v2 for various facial part movements by Heng, Sheng Guang, Rosdiyana, Samad, Mahfuzah, Mustafa, Nor Rul Hasma, Abdullah, Pebrianti, Dwi

    Published 2019
    “…To investigate the changes in the movement of facial feature points, the points will be paired up for distance ratio calculation between different frames of face image. The action unit of facial points for both Kinect cameras are different and there are some improvements in Kinect v2: asymmetrical facial points, high definition face detection and eye tracking as added action units. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Development of sorting system for oil palm in vitro shoots using machine vision approach by Al-Ruhaimi, Hamdan Yahya Ahmed

    Published 2014
    “…Close results between the performance of the developed sorting algorithm and SVM algorithm demonstrate that it is satisfactory and efficient. …”
    Get full text
    Get full text
    Thesis