Search Results - (( frames extraction method algorithm ) OR ( data visualization mining algorithm ))
Search alternatives:
- visualization mining »
- data visualization »
- frames extraction »
- extraction method »
- method algorithm »
- mining algorithm »
-
1
An Improved Action Key Frames Extraction Algorithm for Complex Colour Video Shot Summarization
Published 2019“…The objective of this work is to improve our previous action key frames extraction algorithm (AKF) by adapting a threshold which selects action key frames as final key frames. …”
Get full text
Get full text
Article -
2
Algorithm Development of Bidirectional Agglomerative Hierarchical Clustering Using AVL Tree with Visualization
Published 2024thesis::doctoral thesis -
3
DATA CLASSIFICATION SYSTEM WITH FUZZY NEURAL BASED APPROACH
Published 2005“…The project's objective is identifying the available data mining algorithms in data classification and applying new data mining algorithm to perform classification tasks. …”
Get full text
Get full text
Final Year Project -
4
-
5
The application of neural network data mining algorithm into mixed pixel classification in geographic information system environment
Published 2007“…However, hyperspectral image systems produce large data sets that are not easily interpretable by visual analysis and therefore require automated processing algorithm. …”
Get full text
Get full text
Conference or Workshop Item -
6
A fast feature extraction algorithm for image and video processing
Published 2019“…These features are used to represent the local visual content of images and video frames. We compared the proposed method with the traditional approach of feature extraction using a standard image technique. …”
Get full text
Get full text
Conference or Workshop Item -
7
AR oriented pose matching mechanism from motion capture data
Published 2023“…In order to extract the exact matched pose, the frame sequence is divided into pose feature frame and skeletal data frame by the use of pose matching dance training movement recognition algorithm (PMDTMR). …”
Article -
8
Data mining based damage identification using imperialist competitive algorithm and artificial neural network
Published 2018“…In this study, to predict the damage severity of sin-gle-point damage scenarios of I-beam structures a data mining based damage identification framework and a hybrid algorithm combining Artificial Neural Network (ANN) and Imperial Competitive Algorithm (ICA), called ICA-ANN method, is proposed. …”
Get full text
Get full text
Article -
9
Automated threshold detection for object segmentation in colour image
Published 2016“…In solving this issue, this paper presents an Automated Threshold Detection Algorithm, H(•). The algorithm is applied in segmenting human lower limbs from a series of image frames of human walking. …”
Get full text
Get full text
Get full text
Get full text
Article -
10
Local DTW coefficients and pitch feature for back-propagation NN digits recognition
Published 2006“…The LPC features vectors are aligned between the source frames to the template using our DTW frame fixing (DTW-FF) algorithm. …”
Get full text
Conference or Workshop Item -
11
Time normalization of LPC feature using warping method
Published 2005Get full text
Get full text
Get full text
Article -
12
Image classification using two dimensional wavelet coefficients with parallel computing
Published 2020“…This method is capable to shorten the process time of the computation-intensive program in this research to process the live images frame by frame, which received from a laptop webcam to achieve real-time video processing. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
13
Local DTW Coefficients and Pitch Feature for Back-Propagation NN Digits Recognition
Published 2006“…The LPC features vectors are aligned between the source frames to the template using our DTW frame fixing (DTW-FF) algorithm. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Using text mining algorithm to detect gender deception based on Malaysian chat room lingo / Dianne L. M. Cheong and Nur Atiqah Sia Abdullah @ Sia Sze Yieng
Published 2006“…Inference can be made both from writing style and from clues hidden in the posting data. A text-mining algorithm was designed to detect gender deception based on gender-preferential features at the word or clause level of Malaysian e-mail users. …”
Get full text
Get full text
Get full text
Article -
15
A new multi-frames watermarking technique for tamper detection and recovery
Published 2017“…The objectives of the research are to resolve the time constraint of sequential multi-frames watermarking process. The sequential multi-frames watermarking process could be speed up by two methods, first method was designed a speedy watermarking scheme algorithm (ROI-DR) in a single frame of medical image, and the second method was developed a new multi-frames watermarking scheme by adding parallelism component into sequential multi-frames watermarking process. …”
Get full text
Get full text
Thesis -
16
Classification of students' performance in computer programming course according to learning style
Published 2024Conference Paper -
17
A wavelet based watermarking algorithm for video
Published 2005“…In this algorithm, to achieve better imperceptibility and robustness a binary image watermark is inserted into the middle frequency subband coefficients of the blue component of the video frame. …”
Get full text
Get full text
Conference or Workshop Item -
18
Image Stitching Of Aerial Footage
Published 2021“…The implemented method successfully stitched the frames extracted from the aerial footage to generate a large scene image beyond the normal resolution.…”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
19
Using text mining algorithm to detect gender deception based on Malaysian chatroom lingo / Dianne L.M. Cheong and Nur Atiqah Sia Abdullah@Sia Sze Yieng
Published 2006“…Based on this designed text algorithm, a prototype in Visual Basic is developed. …”
Get full text
Get full text
Research Reports -
20
Enhancing predictive crime mapping model using association rule mining for geographical and demographic structure
Published 2014“…This project proposed a data mining technique called Association Rule Mining. …”
Get full text
Get full text
Get full text
Conference or Workshop Item
