Search Results - (( frames information making algorithm ) OR ( java implication based algorithm ))

Refine Results
  1. 1

    Depth frame loss concealment for wireless transmission utilising motion detection information by Ranjbari, Mohamadreza

    Published 2014
    “…The methods are able to facilitate a frame copy algorithm and a high correlation of colour and depth frames to conceal depth frame loss. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Restoration of missing data in old archives based on genetic algorithm by Khammar, Mohammad Reza, Saripan, M. Iqbal, Marhaban, Mohammad Hamiruce, Ishak, Asnor Juraiza, Zolfaghari, Fateme

    Published 2014
    “…The information of previous or next frames is not needed in this implementation. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3
  4. 4

    REGION-BASED ADAPTIVE DISTRIBUTED VIDEO CODING CODEC by ABDELRAHMAN ELAMIN, ABDELRAHMAN ELAMIN

    Published 2011
    “…Due to the limitation of compensation method, the predicted frame, or the side information, is expected to have varying degrees of success. …”
    Get full text
    Get full text
    Thesis
  5. 5

    SLAMM: Visual monocular SLAM with continuous mapping using multiple maps by Daoud, Hayyan Afeef, Sabri, Aznul Qalid Md, Loo, Chu Kiong, Mansoor, Ali Mohammed

    Published 2018
    “…It is a system that ensures continuous mapping and information preservation despite failures in tracking due to corrupted frames or sensor’s malfunction; making it suitable for real-world applications. …”
    Get full text
    Get full text
    Article
  6. 6

    Frame selection based on modified entropy and object motion for secured data hiding in videos by Muhammad Fuad, Abdullah

    Published 2021
    “…The growth of internet technology makes hiding information techniques become popular communication. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Using predictive analytics to solve a newsvendor problem / S. Sarifah Radiah Shariff and Hady Hud by Shariff, S. Sarifah Radiah, Hud, Hady

    Published 2023
    “…Originality/value Overall, this research provides initial insights into adopting Machine Learning algorithms in making better-informed managerial decisions among SMEs in Malaysia…”
    Get full text
    Get full text
    Book Section
  8. 8

    Spotting events in football videos with a combination of two-stream convolutional neural network and dilated recurrent neural network / Behzad Mahaseni by Behzad , Mahaseni

    Published 2021
    “…Unlike images, videos provide additional temporal information. While this additional information is helpful, it also makes the reasoning more challenging. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10
  11. 11

    Efficient management of Top-k queries over Uncertain Data Streams with dynamic Sliding Window Model by Raja Wahab, Raja Azhan Syah

    Published 2024
    “…This method reduces computational costs by efficiently handling the insertion and exit policy for the appropriate tuple candidates within a specified window frame. The experiments in this study compare the SWMTop-kDelta algorithm with two previous researchers and two baseline approach algorithms to evaluate their effectiveness. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    The Fuzzy Logic Approach for Modelling Object Physical Features and Holes Occupancies by Syed Abdul Hamid , Syed Mohamad Shazali, Sulaiman , Marizan, Said, Mohamed Azmi

    Published 2008
    “…This system is generated in on-event processes and suitable for indoor environment applications with low time frame rate camera. This project introduces how to assist a robot arm system using vision system for making decision during conducting an operation or task. …”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Video abstraction using density-based clustering algorithm by Chamasemani, Fereshteh Falah, Affendey, Lilly Suriani, Mustapha, Norwati, Khalid, Fatimah

    Published 2017
    “…Utilizing fusion and the DENCLUE algorithm resulted in the extraction of more informative parts of the videos and increased the robustness of the proposed approach to handle large-scale and noisy videos with no further tuning of the input parameters. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Passive client-centric rogue access point detection framework for WiFi hotspots by Ahmad, Nazrul Muhaimin

    Published 2018
    “…The proliferation of Wi-Fi hotspots in public places provides seamless Internet connectivity anywhere at any time to the wireless clients.Although many hotspots are often unprotected,unmanaged and unencrypted,this does not prevent the clients from actively connecting to the network.The underlying problem is that the network Access Point (AP) is always trusted.The adversary can impersonate a legitimate AP by setting up a rogue AP to commit espionage and to launch evil-twin attack,session hijacking,and eavesdropping.To aggravate the threats, existing detection solutions are ill-equipped to safeguard the client against rogue AP.Infrastructure- centric solutions are heavily relied on the deployment of sensors or centralized server for rogue AP detection, which are limited,expensive and rarely to be implemented in hotspots.Even though client-centric solutions offer threat-aware protection for the client,but the dependency of the existing solutions on the spoofable contextual network information and the necessity to be associated with the network makes those solutions are not viable for the hotspot’s client.Hence,this work proposes a framework of passive client-centric rogue AP detection for hotspots.Unlike existing solutions,the key idea is to piggyback AP-specific and network-specific information in IEEE 802.11 beacon frame that enables the client to perform the detection without authentication and association to any AP.Based on the spatial fingerprints included in the broadcasted information from the APs in the vicinity of the client,this work discloses a novel concept that enables the rogue AP detection via the client’s ability to self-colocalize and self-validate its own position in the hotspot.The legitimacy of the APs in the hotspot,in this view,lies in the fact that the correct matching between the Received Signal Strength Indicator (RSSI) measurements at the client and pre-recorded fingerprints is attainable when the beacons are transmitted only from the legitimate APs.Hence,any anomalousness in AP’s beacon frame or any attempt to replay the legitimate AP’s beacon frame from different location can be detected and classified as rogue AP threats.Through experiments in real environment,the results demonstrate that with proper algorithm selection and parameters tuning,the rogue AP detection framework can achieve over 90% detection accuracy in classifying the absence and presence of rogue AP threats in the hotspot.…”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Pose estimation algorithm for mobile Augmented Reality based on inertial sensor fusion by Alam, Mir Suhail, Morshidi, Malik Arman, Gunawan, Teddy Surya, Olanrewaju, Rashidah Funke, Arifin, Fatchul

    Published 2021
    “…Objects augmented in the current system have much jitter due to frame illumination changes, affecting the accuracy of vision-based pose estimation. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    A new algorithm for human face detection using skin color tone by Zangana, Hewa Majeed, Alshaikhli, Imad Fakhri Taha

    Published 2013
    “…The images used in this system are color images which give additional information about the images than the gray images provide. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18
  19. 19
  20. 20

    Machine Learning-Enabled Communication Approach for the Internet of Medical Things by Rahim Khan, Abdullah Ghani, Samia Allaoua Chelloug, Mohammed Amin, Aamir Saeed, Jason Teo

    Published 2023
    “…The Internet of Medical Things (IoMT) is mainly concerned with the efficient utilisation of wearable devices in the healthcare domain to manage various processes automatically, whereas machine learning approaches enable these smart systems to make informed decisions. Generally, broadcasting is used for the transmission of frames, whereas congestion, energy efficiency, and excessive load are among the common issues associated with existing approaches. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article