Search Results - (( recognition activity detection algorithm ) OR ( java implementation based algorithm ))
Search alternatives:
- implementation based »
- java implementation »
-
1
Fraud detection in telecommunication using pattern recognition method / Mohd Izhan Mohd Yusoff
Published 2014“…The new algorithm is tested on simulated and real data where the results show it is capable of detecting fraud activities. …”
Get full text
Get full text
Get full text
Thesis -
2
RSA Encryption & Decryption using JAVA
Published 2006“…Today, with online marketing, banking, healthcare and other services, even the average householder is aware of encryption. The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
3
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
4
Vehicle Monitoring System Using Motion Detection Algorithms For USM Campus.
Published 2007“…Maintaining security in university campuses is most definitely the talk of today. problems surface when security personnel need to constantly patrol the campus grounds to ,monitor activities of vehicles. With the possible introduction of the motion detection and character recognition algorithms in security systems of the future, vehicle identities such as license plate numbers can be captured and processed at the security post to make it possible for the vehicles to be monitored remotely. …”
Get full text
Get full text
Conference or Workshop Item -
5
Feature extraction for face recognition via Active Shape Model (ASM) and Active Appearance Model (AAM)
Published 2018“…Precise and strong location of trait point is a complicated and difficult issue in face recognition. Cootes proposed a Multi Resolution Active Shape Models (ASM) algorithm, which could extract specified shape accurately and efficiently. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Automatic Number Plate Recognition on android platform: With some Java code excerpts
Published 2016“…The main challenges of implementing ANPR algorithm on mobile phone are how to produce a higher coding efficiency, lower computational complexity, and higher scalability. …”
Get full text
Get full text
Get full text
Book -
7
HUMAN MOTION ANALYSIS IN VIDEO SURVEILLANCE SYSTEM
Published 2019“…The essential component of any intelligent video surveillance was detection and tracking, followed by analysis and recognition that classify into type of human motion activities. …”
Get full text
Get full text
Final Year Project -
8
Evaluating the effect of voice activity detection in isolated Yoruba Word Recognition System
Published 2011Get full text
Get full text
Get full text
Proceeding Paper -
9
Two-factor authentication smart entryway using modified LBPH algorithm
Published 2024“…The system employs the Local Binary Patterns Histograms for the full face recognition algorithm and modified LBPH algorithm for occluded face detection. …”
Get full text
Get full text
Get full text
Article -
10
A Systematic Review of Metaheuristic Algorithms in Human Activity Recognition : Applications, Trends, and Challenges
Published 2025“…Metaheuristic algorithms have emerged as promising techniques for optimizing human activity recognition (HAR) systems. …”
Get full text
Get full text
Get full text
Article -
11
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…A design proposal was outlined to provide an adaptive client/server approach to stream audio contents using Real-Time Transport Protocol (RTP) involving architecture based on the Java Media Framework (JMF) Application Programmable Interfaces (API).RTP protocol is the Internet-standard protocol for the transport of real-time data, including audio and video and can be implemented by using Java Media Framework (JMF). …”
Get full text
Get full text
Thesis -
12
Fraud detection in telecommunication industry using Gaussian mixed model
Published 2013“…In this article, we propose a new fraud detection algorithm using Gaussian mixed model (GMM), a probabilistic model successfully used in speech recognition problem. …”
Get full text
Get full text
Conference or Workshop Item -
13
Classification and detection of intelligent house resident activities using multiagent
Published 2013“…Result shows that, the algorithm can successfully identify 135 unique tasks of different lengths.This algorithm is surely being an alternate way of pattern recognition in intelligent home.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Café Web Based System Using Priority Scheduling Approach
Published 2017“…The priority scheduling algorithm is based on Control Processing Unit scheduling algorithm where it has a priority to execute tasks. …”
Get full text
Get full text
Conference or Workshop Item -
15
Data fusion and multiple classifier systems for human activity detection and health monitoring: Review and open research directions
Published 2019“…Wearable devices, smart-phones and ambient environments devices are equipped with variety of sensors such as accelerometers, gyroscopes, magnetometer, heart rate, pressure and wearable camera for activity detection and monitoring. These sensors are pre-processed and different feature sets such as time domain, frequency domain, wavelet transform are extracted and transform using machine learning algorithm for human activity classification and monitoring. …”
Get full text
Get full text
Article -
16
Face recognition using PZMI, ANN and Ant colony algorithms / Milad Miri
Published 2018“…Algorithms developed for face recognition are tightly related to the rate of extracted face features. …”
Get full text
Get full text
Get full text
Thesis -
17
Behavior Recognition In Video Surveillance System For Indoor Public Areas Using Artificial Immune System
Published 2008“…Behavior recognition and predicting the activities of people in public areas are still a major concern in image processing and artificial intelligence science. …”
Get full text
Get full text
Thesis -
18
Pairwise testing tools based on hill climbing algorithm (PTCA)
Published 2014“…The actual implementation of the algorithm which is in Java programming language, the program is implemented on Net Bean 7.0.1. …”
Get full text
Get full text
Undergraduates Project Papers -
19
Java based expert system for selection of natural fibre composite materials
Published 2013“…In this paper, we develop a technology for the materials selection system using Java based expert system. The weighted-range method (WRM) was implemented to identify the range value and to scrutinise the candidate materials. …”
Get full text
Get full text
Get full text
Article -
20
Iris localisation using Fuzzy Centre Detection (FCD) scheme and active contour snake
Published 2014“…Iris localisation is a crucial operation in iris recognition algorithm and also in applications, where irises are the main target object. …”
Get full text
Get full text
Get full text
Article
