• No results found

[PDF] Top 20 Study of Methods Detect Anomalous Activities in Videos

Has 10000 "Study of Methods Detect Anomalous Activities in Videos" found on our website. Below are the top 20 most common "Study of Methods Detect Anomalous Activities in Videos".

Study of Methods Detect Anomalous  Activities in Videos

Study of Methods Detect Anomalous Activities in Videos

... Yifei Zhang, Wen Qu, Daling Wang (2013) [10] in real timevideos because of complex background, failure in single action recognition is observed. The action-scene model is explored in this paper to learn the relationship ... See full document

7

Segmentation of an Indian Classical Dance Videos using Different Segmentation Methods

Segmentation of an Indian Classical Dance Videos using Different Segmentation Methods

... Abstract: Video to frame conversion features are retrieved to categorize the actions in an Indian classical dance video dataset. The goal is to design an automatic machine learning model that identifies the moves of a ... See full document

5

Refbacks

Refbacks

... present study is to analyze science teacher candidates‘ laboratory videos by using Many-facet Rasch ...the study. The study was conducted in 2017-2018 academic year spring ...science ... See full document

11

The Effect of Browsing Social Networking Websites: The Effect of Browsing You tube on the Attitude of Egyptians Towards Those Who Have Different Political Views

The Effect of Browsing Social Networking Websites: The Effect of Browsing You tube on the Attitude of Egyptians Towards Those Who Have Different Political Views

... YouTube videos of those published by the government of Jakarta, such videos were viewed and even liked by ...the activities of the South African President, Jacob Zuma, and whether such movies contain ... See full document

32

Crowd Behavior Detection for Abnormal Conditions

Crowd Behavior Detection for Abnormal Conditions

... Automatically crowd behavior is identified from surveillance videos. The existing method does not give the accurate results for the identifying the crowd behavior in the videos. Therefore proposed system by ... See full document

5

Does the Flipped Classroom Method Enhance the Learning of Undergraduate Medical Students: A Review

Does the Flipped Classroom Method Enhance the Learning of Undergraduate Medical Students: A Review

... This study examined the findings of comparative articles through analysis in order to summarize the overall effects of teaching with the flipped classroom ...pre-recorded videos were provided before ... See full document

7

Contributing Factors to Childhood Overweight and Obesity in Kuwait

Contributing Factors to Childhood Overweight and Obesity in Kuwait

... this study indicate that the majority of children ate from fast food restaurants and pursued sedentary activities ...TV, videos, and spending time on the computer, tablet, and phone every day of the ... See full document

23

Advanced Drowsiness Detection Systems Based on Human Activities and Videos

Advanced Drowsiness Detection Systems Based on Human Activities and Videos

... to detect these kinds of situations to avoid such ...several methods where drivers need to wear some headband or external ...to detect the sleeping behavior of a driver with existing parameters and ... See full document

13

Prediction of Anomalous Activities in a Video

Prediction of Anomalous Activities in a Video

... The paper proposed a deep learning approach to detect real- world anomalies in surveillance videos. The deep learning algorithms such as CNN and bidirectional LSTMs are used to learn spatial and temporal ... See full document

6

Survey on Anomalous Topic Discovery in Discrete Data

Survey on Anomalous Topic Discovery in Discrete Data

... The author [3] have tried to provide a broad sample of current techniques and has introduce a survey of contemporary techniques for outlier detection, Outlier detection has been used for centuries to detect and, ... See full document

8

NeuDetect: A neural network data mining system for wireless network intrusion detection

NeuDetect: A neural network data mining system for wireless network intrusion detection

... personal study and research purposes only, in accordance with the Canadian Copyright Act and the Creative Commons license—CC BY-NC-ND (Attribution, Non-Commercial, No Derivative ... See full document

123

Generation of Labelled Datasets to Quantify the Impact of Security Threats to Cloud Data Centers

Generation of Labelled Datasets to Quantify the Impact of Security Threats to Cloud Data Centers

... DHS Predict is a distributed repository of many hosts and providers at major universities and other institu- tions. Datasets mainly include Domain Name System (DNS) data, Internet Traffic Flow, Border Gateway Pro- tocol ... See full document

13

Title: Secure Neighbor Discovery in Wireless Networks by Detecting Various Attacks
Authors: Nagesh Sindagi, K Sundeep kumar, Manoj Challa, Ashwatha Kumar M
Country: India
abstract  pdf


Title: Design and Implementation of Enhanced Secure Field Based Rout

Title: Secure Neighbor Discovery in Wireless Networks by Detecting Various Attacks Authors: Nagesh Sindagi, K Sundeep kumar, Manoj Challa, Ashwatha Kumar M Country: India abstract pdf Title: Design and Implementation of Enhanced Secure Field Based Routing in Wireless Mesh Network (WMN) Authors: K V Sheelavathy, C R Manjunath Country: India abstract pdf Title: Performance Evaluation of Average Energy Consumption in DSR Protocol Authors: Ruhy Khanam, Chaitali Sinha Country: India abstract pdf Title: A Cooperative Approach for Understanding Behavior of Intrusion Detection System in Mobile Ad Hoc Networks Authors: Leena Sahu, Chaitali Sinha Country: India abstract pdf Title: The Differential Problem of Some Functions Authors: Chii-Huei Yu Country: Taiwan abstract pdf

... compares the information it gathers against those attack signatures to detect a match. These types of systems are normally presumed to be able to detect only attacks “known” to its database. Thus, if the ... See full document

7

The study of anticancer and antifungal activities of Pistacia integerrima extract In vitro

The study of anticancer and antifungal activities of Pistacia integerrima extract In vitro

... Pistacia integerrima Stew. ex Brand (Anacardiaceae) is an ethanobotanically important plant species traditionally used in the treatment of chronic wounds, jaundice, dysentery, etc. The crude extract from Pistacia ... See full document

5

ANALYSIS OF SCAN ATTACK THROUGH THRESHOLD BASED BEHAVIOR MODEL

ANALYSIS OF SCAN ATTACK THROUGH THRESHOLD BASED BEHAVIOR MODEL

... malicious activities aimed at different system configurations and/or different time periods, and thus, to some extent, to generalize our ...selection methods in combination with K-means clustering to ... See full document

6

Stable Routing Protocol for Mobile Ad-Hoc Networks

Stable Routing Protocol for Mobile Ad-Hoc Networks

... Systems for learning to detect anomalous email behavior, such as worms and viruses, tend to build either per user models or a single global model. Global models leverage a larger training corpus but often ... See full document

6

Comprehensive Study of Various Methods of Power Generation through Suspension System

Comprehensive Study of Various Methods of Power Generation through Suspension System

... Volume 4, Issue 3, March – 2019 International Journal of Innovative Science and Research Technology ISSN No 2456 2165 IJISRT19MA693 www ijisrt com 795 Comprehensive Study of Various Methods of Power G[.] ... See full document

5

Evaluation of Antibacterial Activities of Aqueous and Methanolic Extracts of Areca Catechu Against Some Opportunistic Oral Bacteria

Evaluation of Antibacterial Activities of Aqueous and Methanolic Extracts of Areca Catechu Against Some Opportunistic Oral Bacteria

... present study supports the use of natural products for medication as antibacterial agents found in plant extract, which exhibits antibacterial activity to some opportunistic oral bacteria, we have some ... See full document

5

Comparative Analysis of Methods to Reduce Blocking Artifacts in Images and Videos

Comparative Analysis of Methods to Reduce Blocking Artifacts in Images and Videos

... Video compression is important topics of research in the field of multimedia. As raw videos are large in size without compress video it is difficult to transmit videos over a network or store them on a ... See full document

9

Assessing public engagement with science in a university primate research centre in a national zoo

Assessing public engagement with science in a university primate research centre in a national zoo

... Recent years have seen increasing encouragement by research institutions and funding bodies for scientists to actively engage with the public, who ultimately finance their work. Animal behaviour as a discipline possesses ... See full document

9

Show all 10000 documents...