Search Results - candidate ((connection algorithm) OR (detection algorithm))
Search alternatives:
-
1
3D face candidate region detection using background subtraction / Zulfikri Paidi and Nurzaid Muhd Zain
Published 2016“…Our focus is to solve the first challenge in face registration, which is to detect and identify face region. From the experiment, it shows some promising results related to using background subtraction in face candidate region detection algorithm. …”
Get full text
Get full text
Get full text
Article -
2
Automated face localization and facial features detection using geometric information
Published 2011Get full text
Working Paper -
3
-
4
Temporal video segmentation using squared form of Krawtchouk-Tchebichef moments
Published 2018“…The fade transitions are detected based on the smoothed moments energy and the moments of gradients correlation for the candidate segments. …”
Get full text
Get full text
Get full text
Thesis -
5
Skin detection using HSV color component subtraction and texture information / Rizal Mat Jusoh and Norhazimi Hamzah
Published 2010“…This thesis presents skin detection algorithm for detecting human skin regions in color images. …”
Get full text
Get full text
Research Reports -
6
-
7
Improvement real-time detection of moving vehicle in a dynamic scene using shadow removal method / Khairul Azman Ahmad, Mohd Halim Mohd Noor,Mohamad Adha Mohamad Idin
Published 2011“…Real-time processing is still feasible as these sophisticated algorithms are applied only a small number of candidates foreground pixels. …”
Get full text
Get full text
Research Reports -
8
Improved Malware detection model with Apriori Association rule and particle swarm optimization
Published 2019“…These rule models are used together with extraction algorithm to classify and detect malicious android application. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
9
Android Malware classification using static code analysis and Apriori algorithm improved with particle swarm optimization
Published 2014“…In this method, features were extracted from Android applications byte-code through static code analysis, selected and were used to train supervised classifiers. Using a number of candidate detectors, the true positive rate of detecting malicious code is maximized, while the false positive rate of wrongful detection is minimized. …”
Get full text
Get full text
Get full text
Proceeding Paper -
10
Static code analysis of permission-based features for android malware classification using apriori algorithm with particle swarm optimization
Published 2015“…This paper presents a classification approach on android malware using candidate detectors generated from an unsupervised association rule of Apriori Algorithm. …”
Get full text
Get full text
Get full text
Article -
11
Fraud detection in telecommunication industry using Gaussian mixed model
Published 2013“…Using data obtained from one of the leading telecommunication companies in Malaysia, we show that the proposed algorithm has successfully not only detected fraud calls as suspected by the company, but also to identify suspicious calls which can be candidates of fraud call. …”
Get full text
Get full text
Conference or Workshop Item -
12
Integrated face and facial components detection
Published 2015“…The system detects face, nose and mouth using three different classifiers, which were created based on the Viola-Jones method [1] and the eyes were detected using an Eye Detection method that consists of resolution reduction, identification of the eye candidates using eye filter [2] and eyes localization based on mean comparison. …”
Get full text
Get full text
Conference or Workshop Item -
13
Improving the efficiency of clustering algorithm for duplicates detection
Published 2023“…Clustering method is a technique used for comparisons reduction between the candidates records in the duplicate detection process. …”
Get full text
Get full text
Get full text
Get full text
Article -
14
Dingle's Model-based EEG Peak Detection using a Rule-based Classifier
Published 2015“…In this study, the performances of four different peak models of time domain approach which are Dumpala's, Acir's, Liu's, and Dingle's peak models are evaluated for electroencephalogram (EEG) signal peak detection algorithm. The algorithm is developed into three stages: peak candidate detection, feature extraction, and classification. …”
Get full text
Get full text
Conference or Workshop Item -
15
Fast shot boundary detection based on separable moments and support vector machine
Published 2021“…Moreover, for the proposed SBD algorithm, a comparative study is performed with state-of-the-art algorithms. …”
Get full text
Get full text
Get full text
Article -
16
Mining and integration of oral cancer genomics for predictive therapeutics / Bernard Lee Kok Bang
Published 2019“…Technical evaluation of performance reliability of six gene signature similarity scoring algorithms showed that the Weighted Connectivity Score or the statistically significant Connectivity Map, are prime candidates for upgrading the current core algorithm of DeSigN, which is based on the Kolmogorov-Smirnov statistic. …”
Get full text
Get full text
Thesis -
17
A Fast Vertical Edge Detection Algorithm for Car License Plate Detection
Published 2009“…This thesis aims to propose a fast vertical edge detector using Vertical Edge Detection Algorithm (VEDA) and to build a Car License Plate Detection (CLPD) method. …”
Get full text
Get full text
Thesis -
18
Vertical-edge-based car-license-plate detection method
Published 2013“…Finally, an LP is detected. The third contribution is that we compare the VEDA to the Sobel operator in terms of accuracy, algorithm complexity, and processing time. …”
Get full text
Get full text
Get full text
Article -
19
A feature-based approach for segmenting faces
Published 2004“…The algorithm detects feature points from the image and groups them into face candidates using geometric and grey level constraints. …”
Get full text
Get full text
Article -
20
Evaluation of different peak models of eye blink EEG for signal peak detection using artificial neural network
Published 2016“…Therefore, the purpose of peak detection algorithm is to distinguish an actual peak location from a list of peak candidates. …”
Get full text
Get full text
Article
