Search Results - (( frames extraction data algorithm ) OR ( java application customization algorithm ))

Refine Results
  1. 1

    An improved method in speech signal input representation based on DTW technique for NN speech recognition system by Sudirman, Rubita, Salleh, Sh. Hussain, Salleh, Shaharuddin

    Published 2007
    “…The purpose of the new algorithm is to align the input frames in the test set to the template frames in the reference set. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    AR oriented pose matching mechanism from motion capture data by Iqbal J., Sidhu M.S., Ariff M.B.M.

    Published 2023
    “…In order to extract the exact matched pose, the frame sequence is divided into pose feature frame and skeletal data frame by the use of pose matching dance training movement recognition algorithm (PMDTMR). …”
    Article
  3. 3

    A fast feature extraction algorithm for image and video processing by Abdulhussain, Sadiq H., Ramli, Abdul Rahman, Mahmmod, Basheera M., Saripan, M. Iqbal, Syed Mohamed, Syed Abdul Rahman Al-Haddad, Baker, Thar, Flayyih, Wameedh Nazar, Jassim, Wissam A.

    Published 2019
    “…Therefore, high processing time for that sheer volume of data will be required. Image and video applications demand for reduction in computational cost (processing time) when extracting features. …”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Image Stitching Of Aerial Footage by Ng, Wei Haen

    Published 2021
    “…In this project, an image stitching framework is proposed to take aerial footage as input data. The proposed algorithm extracts the frames of the aerial footage and undistorts the bird-eye-effect of the images to remove the noises. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  5. 5

    Automated threshold detection for object segmentation in colour image by Akhtaruzzaman, Md., Shafie, Amir Akramin, Khan, Md. Raisuddin

    Published 2016
    “…The algorithm is applied in segmenting human lower limbs from a series of image frames of human walking. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Time normalization of LPC feature using warping method by Sudirman, Rubita, Salleh, Sh. Hussain, Khalid, Puspa Inayat, Ahmad, Abd. Hamid

    Published 2005
    “…Another task is to align the input frames (test set) to the reference template (training set) using DTW fixing frame (DTW-FF) algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Pre-processing of input features using LPC and warping process by Sudirman, Rubita, Sh-Hussain, Salleh, Ming, Ting Chee

    Published 2005
    “…Another task is to align the input frames (test set) to the reference template (training set) using a modified DTW algorithm called DTW fixing frame (DTW-FF)algorithm. …”
    Get full text
    Get full text
    Article
  8. 8

    DTWFF-pitch feature and faster neural network convergence for speech recognition by Sudirman, Rubita, Salleh, Sh. Hussain, Salleh, Shaharuddin

    Published 2007
    “…Another task is to align the input frames (test set) to the reference template (training set) using DTW fixing frame (DTW-FF) algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Image classification using two dimensional wavelet coefficients with parallel computing by Ong, Yew Fai

    Published 2020
    “…Wavelet is a mathematical function that decomposes any given data signals and enabling the extraction of discontinuities and sharp spikes permeated in the signal. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  10. 10

    Development Of A Robust Blind Digital Video Watermarking Algorithm Using Discrete Wavelet Transform by Al-Deen, Ahmed A. Baha'a

    Published 2007
    “…On the other hand, a random key is used to choose the frames to be watermarked to increase the security level of the algorithm and discourage piracy. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12
  13. 13

    Enhanced mechanism to handle missing data of Hadith classifier by Aldhlan, Kawther A., Zeki, Ahmed M., Zeki, Akram M.

    Published 2011
    “…Decision tree algorithms have the ability to deal with missing values or wrong data. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  14. 14

    Detection and Classification of Moving Objects for an Automated Surveillance System by Md. Tomari, Mohd Razali

    Published 2006
    “…Finally, classification algorithm that makes use of the extracted moment values from the detected objects successfully categorize objects into pre-defined classes of human and vehicle with 89.08% of accuracy. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Detection and classification of moving objects for an automated surveillance system by Md Tomari, Mohd Razali

    Published 2006
    “…Finally, classification algorithm that makes use of the extracted moment values from the detected objects successfully categorize objects into pre-defined classes of human and vehicle with 89.08% of accuracy. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Vision-Based Autonomous Vehicle Driving Control System by Isa, Khalid

    Published 2005
    “…In this subsystem, image-capturing techniques capture the video images frame by frame. After that, lane detection process extracts the information about vehicle position with respect to the highway lane. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Vision-based autonomous vehicle driving control system by Isa, Khalid

    Published 2005
    “…In this subsystem, image-capturing techniques capture the video images frame by frame. After that, lane detection process extracts the information about vehicle position with respect to the highway lane. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Efficient NASNetMobile-enhanced Vision Transformer for weakly supervised video anomaly detection by Arif Mohamad, Muhammad Luqman, Abd Rahman, Mohd Amiruddin, Mohd Shah, Nurisya, Kumar Sangaiah, Arun

    Published 2026
    “…Second, we employed a pretrained, low-parameter NASNetMobile algorithm that efficiently extracts fine-grained local spatial details. …”
    Get full text
    Get full text
    Article
  19. 19

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Development Of Vehicle Tracking And Counting System From Traffic Surveillance Video by Kueh , Chiung Lin

    Published 2015
    “…Simple tracking and counting algorithm is used to track and count the detected vehicle. …”
    Get full text
    Get full text
    Thesis