Literature survey on multi-camera system and its application

AS Olagoke, H Ibrahim, SS Teoh - IEEE Access, 2020 - ieeexplore.ieee.org
A multi-camera system combines features from different cameras to exploit a scene of an
event to increase the output image quality. The combination of two or more cameras …

Early detection and classification of internal leakage in boom actuator of mobile hydraulic machines using SVM

JT Jose, J Das, SK Mishra, G Wrat - Engineering Applications of Artificial …, 2021 - Elsevier
Mobile hydraulic machines are used in various operations like construction, material
handling and mining. High powers to weight ratio and manoeuvrability in rough terrains are …

Optimal scheduling of flexible manufacturing system using improved lion-based hybrid machine learning approach

MH Abidi, H Alkhalefah, MK Mohammed, U Umer… - Ieee …, 2020 - ieeexplore.ieee.org
Dispatching rules are generally useful for scheduling jobs in flexible manufacturing systems
(FMSs). However, the appropriateness of these rules relies heavily on the condition of the …

A facial recognition using a combination of a novel one dimension deep CNN and LDA

JM Sahan, EI Abbas, ZM Abood - Materials Today: Proceedings, 2023 - Elsevier
Face recognition is one of the useful tasks and can be used for many applications as
security systems, it is necessary to find effective and low complexity facial classifier methods …

[PDF][PDF] Performance Analysis of PCA-based and LDA-based Algorithms for Face Recognition

S Fernandes, J Bala - International Journal of Signal Processing Systems, 2013 - ijsps.com
Analysing the face recognition rate of various current face recognition algorithms is
absolutely critical in develo** new robust algorithms. In his paper we report performance …

Intrusion detection system for ioe-based medical networks

P Lakhotia, R Dwivedi, DK Sharma… - Journal of Database …, 2023 - igi-global.com
Internet of everything (IoE) has the power of reforming the healthcare sector-various medical
devices, hardware, and software applications that are interconnected, tendering a massive …

[PDF][PDF] Offline Handwritten Signature Identification based on Hybrid Features and Proposed Deep Model

Z Hashim, H Mohsin, A Alkhayyat - Iraqi Journal for Computer Science and …, 2024 - iasj.net
Handwritten signature identification is the process of determining an individual's true identity
by analyzing their signature. This is an important task in various applications such as …

Conceptual model of the smart attendance monitoring system using computer vision

L Mothwa, JR Tapamo, T Mapati - 2018 14th International …, 2018 - ieeexplore.ieee.org
The monitoring of student attendance remains a fundamental and vital part of any
educational institution. Although some automated biometric-based attendance monitoring …

Feature extraction techniques: fundamental concepts and survey

HA Elnemr, NM Zayed… - Handbook of research on …, 2016 - igi-global.com
The feature extraction is the process to represent raw image in a reduced form to facilitate
decision making such as pattern detection, classification or recognition. Finding and …

Optimal feature selection for big data classification: firefly with lion-assisted model

RS Selvi, ML Valarmathi - Big data, 2020 - liebertpub.com
In this article, the proposed method develops a big data classification model with the aid of
intelligent techniques. Here, the Parallel Pool Map reduce Framework is used for handling …