Search Results - (( frames information making algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- frames information »
- information making »
- implication based »
- making algorithm »
- java implication »
-
1
Depth frame loss concealment for wireless transmission utilising motion detection information
Published 2014“…The methods are able to facilitate a frame copy algorithm and a high correlation of colour and depth frames to conceal depth frame loss. …”
Get full text
Get full text
Thesis -
2
Restoration of missing data in old archives based on genetic algorithm
Published 2014“…The information of previous or next frames is not needed in this implementation. …”
Get full text
Get full text
Conference or Workshop Item -
3
-
4
REGION-BASED ADAPTIVE DISTRIBUTED VIDEO CODING CODEC
Published 2011“…Due to the limitation of compensation method, the predicted frame, or the side information, is expected to have varying degrees of success. …”
Get full text
Get full text
Thesis -
5
SLAMM: Visual monocular SLAM with continuous mapping using multiple maps
Published 2018“…It is a system that ensures continuous mapping and information preservation despite failures in tracking due to corrupted frames or sensor’s malfunction; making it suitable for real-world applications. …”
Get full text
Get full text
Article -
6
Frame selection based on modified entropy and object motion for secured data hiding in videos
Published 2021“…The growth of internet technology makes hiding information techniques become popular communication. …”
Get full text
Get full text
Thesis -
7
Using predictive analytics to solve a newsvendor problem / S. Sarifah Radiah Shariff and Hady Hud
Published 2023“…Originality/value Overall, this research provides initial insights into adopting Machine Learning algorithms in making better-informed managerial decisions among SMEs in Malaysia…”
Get full text
Get full text
Book Section -
8
Spotting events in football videos with a combination of two-stream convolutional neural network and dilated recurrent neural network / Behzad Mahaseni
Published 2021“…Unlike images, videos provide additional temporal information. While this additional information is helpful, it also makes the reasoning more challenging. …”
Get full text
Get full text
Get full text
Thesis -
9
-
10
-
11
Efficient management of Top-k queries over Uncertain Data Streams with dynamic Sliding Window Model
Published 2024“…This method reduces computational costs by efficiently handling the insertion and exit policy for the appropriate tuple candidates within a specified window frame. The experiments in this study compare the SWMTop-kDelta algorithm with two previous researchers and two baseline approach algorithms to evaluate their effectiveness. …”
Get full text
Get full text
Get full text
Thesis -
12
The Fuzzy Logic Approach for Modelling Object Physical Features and Holes Occupancies
Published 2008“…This system is generated in on-event processes and suitable for indoor environment applications with low time frame rate camera. This project introduces how to assist a robot arm system using vision system for making decision during conducting an operation or task. …”
Get full text
Get full text
Conference or Workshop Item -
13
Video abstraction using density-based clustering algorithm
Published 2017“…Utilizing fusion and the DENCLUE algorithm resulted in the extraction of more informative parts of the videos and increased the robustness of the proposed approach to handle large-scale and noisy videos with no further tuning of the input parameters. …”
Get full text
Get full text
Get full text
Article -
14
Passive client-centric rogue access point detection framework for WiFi hotspots
Published 2018“…The proliferation of Wi-Fi hotspots in public places provides seamless Internet connectivity anywhere at any time to the wireless clients.Although many hotspots are often unprotected,unmanaged and unencrypted,this does not prevent the clients from actively connecting to the network.The underlying problem is that the network Access Point (AP) is always trusted.The adversary can impersonate a legitimate AP by setting up a rogue AP to commit espionage and to launch evil-twin attack,session hijacking,and eavesdropping.To aggravate the threats, existing detection solutions are ill-equipped to safeguard the client against rogue AP.Infrastructure- centric solutions are heavily relied on the deployment of sensors or centralized server for rogue AP detection, which are limited,expensive and rarely to be implemented in hotspots.Even though client-centric solutions offer threat-aware protection for the client,but the dependency of the existing solutions on the spoofable contextual network information and the necessity to be associated with the network makes those solutions are not viable for the hotspot’s client.Hence,this work proposes a framework of passive client-centric rogue AP detection for hotspots.Unlike existing solutions,the key idea is to piggyback AP-specific and network-specific information in IEEE 802.11 beacon frame that enables the client to perform the detection without authentication and association to any AP.Based on the spatial fingerprints included in the broadcasted information from the APs in the vicinity of the client,this work discloses a novel concept that enables the rogue AP detection via the client’s ability to self-colocalize and self-validate its own position in the hotspot.The legitimacy of the APs in the hotspot,in this view,lies in the fact that the correct matching between the Received Signal Strength Indicator (RSSI) measurements at the client and pre-recorded fingerprints is attainable when the beacons are transmitted only from the legitimate APs.Hence,any anomalousness in AP’s beacon frame or any attempt to replay the legitimate AP’s beacon frame from different location can be detected and classified as rogue AP threats.Through experiments in real environment,the results demonstrate that with proper algorithm selection and parameters tuning,the rogue AP detection framework can achieve over 90% detection accuracy in classifying the absence and presence of rogue AP threats in the hotspot.…”
Get full text
Get full text
Get full text
Thesis -
15
Pose estimation algorithm for mobile Augmented Reality based on inertial sensor fusion
Published 2021“…Objects augmented in the current system have much jitter due to frame illumination changes, affecting the accuracy of vision-based pose estimation. …”
Get full text
Get full text
Get full text
Article -
16
A new algorithm for human face detection using skin color tone
Published 2013“…The images used in this system are color images which give additional information about the images than the gray images provide. …”
Get full text
Get full text
Get full text
Article -
17
Enhanced Spatial Pyramid Pooling And Intersection Over Union In Yolov4 For Real-time Grocery Recognition System
Published 2024journal::journal article -
18
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
19
Human gait recognition system
Published 2018Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
20
Machine Learning-Enabled Communication Approach for the Internet of Medical Things
Published 2023“…The Internet of Medical Things (IoMT) is mainly concerned with the efficient utilisation of wearable devices in the healthcare domain to manage various processes automatically, whereas machine learning approaches enable these smart systems to make informed decisions. Generally, broadcasting is used for the transmission of frames, whereas congestion, energy efficiency, and excessive load are among the common issues associated with existing approaches. …”
Get full text
Get full text
Get full text
Get full text
Article
