Search Results - (( recognition activity detection algorithm ) OR ( java implication based algorithm ))

Refine Results
  1. 1

    Fraud detection in telecommunication using pattern recognition method / Mohd Izhan Mohd Yusoff by Mohd Yusoff, Mohd Izhan

    Published 2014
    “…The new algorithm is tested on simulated and real data where the results show it is capable of detecting fraud activities. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Vehicle Monitoring System Using Motion Detection Algorithms For USM Campus. by Osman, Mohd. Azam, Talib, Abdullah Zawawi, Tan, Kian Lam, Wong, Poh Lee, Sabudin, Maziani

    Published 2007
    “…Maintaining security in university campuses is most definitely the talk of today. problems surface when security personnel need to constantly patrol the campus grounds to ,monitor activities of vehicles. With the possible introduction of the motion detection and character recognition algorithms in security systems of the future, vehicle identities such as license plate numbers can be captured and processed at the security post to make it possible for the vehicles to be monitored remotely. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Feature extraction for face recognition via Active Shape Model (ASM) and Active Appearance Model (AAM) by Iqtait, M., Mohamad, F.S., Mamat, M.

    Published 2018
    “…Precise and strong location of trait point is a complicated and difficult issue in face recognition. Cootes proposed a Multi Resolution Active Shape Models (ASM) algorithm, which could extract specified shape accurately and efficiently. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    HUMAN MOTION ANALYSIS IN VIDEO SURVEILLANCE SYSTEM by LO , TIMOTHY YIN HONG

    Published 2019
    “…The essential component of any intelligent video surveillance was detection and tracking, followed by analysis and recognition that classify into type of human motion activities. …”
    Get full text
    Get full text
    Final Year Project
  5. 5
  6. 6

    Two-factor authentication smart entryway using modified LBPH algorithm by Ayop, Zakiah, Othman, Nur Fadzilah, Anawar, Syarulnaziah, Wan Mohamad Rosdi, Wan Mohamad Hariz, Looi, Wei Hua

    Published 2024
    “…The system employs the Local Binary Patterns Histograms for the full face recognition algorithm and modified LBPH algorithm for occluded face detection. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    A Systematic Review of Metaheuristic Algorithms in Human Activity Recognition : Applications, Trends, and Challenges by John Deutero, Kisoi, Norfadzlan, Yusup, Syahrul Nizam, Junaini

    Published 2025
    “…Metaheuristic algorithms have emerged as promising techniques for optimizing human activity recognition (HAR) systems. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Fraud detection in telecommunication industry using Gaussian mixed model by Mohd Yusoff, Mohd Izhan, Mohamed, Ibrahim, Abu Bakar, Mohd Rizam

    Published 2013
    “…In this article, we propose a new fraud detection algorithm using Gaussian mixed model (GMM), a probabilistic model successfully used in speech recognition problem. …”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Classification and detection of intelligent house resident activities using multiagent by ,, Mohd. Marufuzzaman, M. B. I., Raez, M. A. M., Ali, Rahman, Labonnah F.

    Published 2013
    “…Result shows that, the algorithm can successfully identify 135 unique tasks of different lengths.This algorithm is surely being an alternate way of pattern recognition in intelligent home.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Data fusion and multiple classifier systems for human activity detection and health monitoring: Review and open research directions by Nweke, Henry Friday, Teh, Ying Wah, Mujtaba, Ghulam, Al-Garadi, Mohammed Ali

    Published 2019
    “…Wearable devices, smart-phones and ambient environments devices are equipped with variety of sensors such as accelerometers, gyroscopes, magnetometer, heart rate, pressure and wearable camera for activity detection and monitoring. These sensors are pre-processed and different feature sets such as time domain, frequency domain, wavelet transform are extracted and transform using machine learning algorithm for human activity classification and monitoring. …”
    Get full text
    Get full text
    Article
  11. 11

    Face recognition using PZMI, ANN and Ant colony algorithms / Milad Miri by Milad , Miri

    Published 2018
    “…Algorithms developed for face recognition are tightly related to the rate of extracted face features. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Behavior Recognition In Video Surveillance System For Indoor Public Areas Using Artificial Immune System by Abad, Azad

    Published 2008
    “…Behavior recognition and predicting the activities of people in public areas are still a major concern in image processing and artificial intelligence science. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Iris localisation using Fuzzy Centre Detection (FCD) scheme and active contour snake by Mat Ibrahim, Masrullizam, Soraghan , John, Abd Manap, Nurulfajar

    Published 2014
    “…Iris localisation is a crucial operation in iris recognition algorithm and also in applications, where irises are the main target object. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Automatic Number Plate Recognition By Using Matlab by Kumaran, Vignes

    Published 2018
    “…This surveillance system is also used for home security, traffic monitoring and at ATM security. Human activity detection and tracking has increased in usage due to decreasing cost of video surveillance camera. …”
    Get full text
    Get full text
    Monograph
  15. 15
  16. 16
  17. 17
  18. 18

    A robust illumination-invariant face recognition based on fusion of thermal IR, maximum filter and visible image by Rayner Pailus, Rayner Alfred

    Published 2020
    “…Face recognition has many challenges especially in real life detection, whereby to maintain consistency in getting an accurate recognition is almost impossible. …”
    Get full text
    Get full text
    Article
  19. 19

    Abnormal Pattern Detection In Ppg Signals Using Time Series Analysis by Siti Nur Hidayah, Mazelan

    Published 2022
    “…This project’s objectives are to implement rule-based algorithm method for abnormal pattern detection in PPG signals, and to investigate the accuracy and performance of rule-based algorithm in detecting the abnormal pattern. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  20. 20

    Rough Neural Networks Architecture For Improving Generalization In Pattern Recognition by Ali Adlan, Hanan Hassan

    Published 2004
    “…The algorithm enhances the recognition ability of the system compared to manual extraction and labeling of pattern classes. …”
    Get full text
    Get full text
    Thesis