Search Results - (( frames interaction based algorithm ) OR ( java application during algorithm ))

Refine Results
  1. 1

    Improved abnormal detection using self-adaptive social force model for visual surveillance by Wan Nur Azhani, W. Samsudin

    Published 2017
    “…Using the attained flow vectors from this stage, interaction force estimation is done based on SFM theory. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Analysis of Motion Detection using Social Force Model by Wan Nur Azhani, W. Samsudin, Kamarul Hawari, Ghazali, Mohd Falfazli, Mat Jusof

    Published 2013
    “…Using the vectors from this method, the interaction forces for each particle in video frames is calculated based on Social Force Model algorithm. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Particle swarm optimization with deep learning for human action recognition by Usmani, U.A., Watada, J., Jaafar, J., Aziz, I.A., Roy, A.

    Published 2021
    “…To extract the appearance based and structural information, each frame of the action sequences is evaluated for spatial features. …”
    Get full text
    Get full text
    Article
  4. 4
  5. 5

    An efficient real-time terrain data organization and visualization algorithm based on enhanced triangle-based level of detail technique by Zamri, Muhamad Najib

    Published 2006
    “…The purpose of this research is to design, develop and implement an algorithm for enhancing the rendering efficiency of triangle-based LOD technique. …”
    Get full text
    Get full text
    Thesis
  6. 6

    SUDOKU HELPER by Abdul Razak, Muhammad Asyraf

    Published 2015
    “…In this paper research, author presents an algorithm to provide a tutorial for any Sudoku player who got stuck during the solving process. …”
    Get full text
    Get full text
    Final Year Project
  7. 7

    Collective interaction filtering with graph-based descriptors for crowd behaviour analysis by Wong, Pei Voon

    Published 2018
    “…The group detection experiment is implemented using the clustering algorithm. Normalized Mutual Information and Rand Index are used to measure the performance of Collective Interaction Filtering. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Algorithm of local features fusion and modified covariance-matrix technique for hand motion position estimation and hand gesture trajectory tracking approach by Thabet, Eman, Khalid, Fatimah, Sulaiman, Puteri Suhaiza, Yaakob, Razali

    Published 2020
    “…The presented algorithm proposes local features fusion based on Gabor-Canny- Hog features embedded an updated compact covariance matrix technique as sophisticated feature-based tracking, utilizing video sequences of IBGHT dataset. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9
  10. 10
  11. 11

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  12. 12
  13. 13

    Crowd behavior monitoring using self-adaptive social force model by Wan Nur Azhani, W. Samsudin, Kamarul Hawari, Ghazali

    Published 2019
    “…The current method used is Social Force Model (SFM), which can describe the behavior of a crowd based on the interaction forces between individuals. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  14. 14
  15. 15

    Multilanguage speech-based gender classification using time-frequency features and SVM classifier by Wani, Taiba, Gunawan, Teddy Surya, Mansor, Hasmah, Ahmad Qadri, Syed Asif, Sophian, Ali, Ambikairajah, Eliathamby, Ihsanto, Eko

    Published 2021
    “…The classification is done based on features derived from the frequency and time domain processing using the Support Vector Machines (SVM) algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Book Chapter
  16. 16
  17. 17
  18. 18
  19. 19

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20