Search Results - (( programming frames detection algorithm ) OR ( java application mining algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    Drone Based People Counter And Tracking Using Unique Id Using Opencv Python by Bhaskar, Hariyaran

    Published 2020
    “…The algorithm is developed so that it is capable to detect various objects by applying a bounding box on the frame image. …”
    Get full text
    Get full text
    Monograph
  4. 4

    Real-Time Video Processing Using Native Programming on Android Platform by Saipullah, Khairul Muzzammil

    Published 2012
    “…The result shows that with native programming on Android platform, even a complicated object detection algorithm can be done in real-time.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Moving detection using cellular neural network (CNN) by Prema Latha, Subramaniam

    Published 2008
    “…Previous motion-based moving object detection approaches often use background subtraction and inter-frame difference or three-frame difference, which are complicated and takes long time. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  6. 6

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Image classification using two dimensional wavelet coefficients with parallel computing by Ong, Yew Fai

    Published 2020
    “…This method is capable to shorten the process time of the computation-intensive program in this research to process the live images frame by frame, which received from a laptop webcam to achieve real-time video processing. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  8. 8

    Mining Sequential Patterns Using I-PrefixSpan by Dhany , Saputra, Rambli Dayang, R.A., Foong, Oi Mean

    Published 2007
    “…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  10. 10

    Video colorization using canny optimization technique / Irwin Kevin Mueson by Irwin Kevin Mueson

    Published 2016
    “…This is a hybrid technique from Colorization using Optimization, which was modified and improved the algorithms by adding Canny Edge Detection to improve the colorization process on the grayscale image or frames. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Vision-Based Autonomous Vehicle Driving Control System by Isa, Khalid

    Published 2005
    “…The important contribution of this study is the development of vehicle lane detection and tracking algorithm based on colour cue segmentation, Canny edge detection and Hough transform. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Vision-based autonomous vehicle driving control system by Isa, Khalid

    Published 2005
    “…The important contribution of this study is the development of vehicle lane detection and tracking algorithm based on colour cue segmentation, Canny edge detection and Hough transform. …”
    Get full text
    Get full text
    Thesis
  14. 14

    SURF algorithm-based panoramic image mosaic application by Watada, J., Zhang, H., Melo, H., Wang, J., Vasant, P.

    Published 2018
    “…To build the image mosaic, SURF (Speeded Up Robust Feature) algorithm is used in feature detection and OpenCV is used in the programming. …”
    Get full text
    Get full text
    Article
  15. 15

    SURF algorithm-based panoramic image mosaic application by Watada, J., Zhang, H., Melo, H., Wang, J., Vasant, P.

    Published 2018
    “…To build the image mosaic, SURF (Speeded Up Robust Feature) algorithm is used in feature detection and OpenCV is used in the programming. …”
    Get full text
    Get full text
    Article
  16. 16

    Development of elasto-plastic viscous damper finite element model for reinforced concrete frames by Hejazi, Farzad, Zabihi, Alireza, Jaafar, Mohd Saleh

    Published 2014
    “…The evaluation of seismic response of structure and damage detection in structural members and damper device was carried out by 3D modeling, of 3 story reinforced concrete frame building under earthquake multi-support excitation.…”
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
    Get full text
    Get full text
    Thesis
  19. 19

    Analytical model for partially prestressed concrete beam-column elements by Esfahani, Milad Hafezolghorani

    Published 2017
    “…Therefore, in order to detect the damages and determine the location of plastic hinges during dynamic loading in element, formulation for plasticity and yielding surface mechanism of PPC frame element is derived. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Cyclic redundancy encoder for error detection in communication channels by Khalifa, Othman Omran, Islam, Md. Rafiqul, Khan, Sheroz

    Published 2004
    “…This paper describes the methodology used and the implementation of the Cyclic Redundancy Check (CRC) algorithm using Ci+ programming. The technique gained its popularity because it combines three advantages: Extreme error detection capabilities, little overhead and ease of implementation. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper