A novel mining system for criminal issues from a video file within cloud computing environment
This paper presents a description of a novel mining system which mines the different occurrences (instances) of the same object from a video file. The framework of the system consists of four steps: segmenting the video file into stable tracks, extracting objects and their features from the tracks,...
| Main Authors: | Ibbini, Emad Mohammed, Ibbini, Mohammed Salameh, Kweh, Yeah Lun |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
IJENS Publisher
2014
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/36221/ http://psasir.upm.edu.my/id/eprint/36221/1/A%20novel%20mining%20system%20for%20criminal%20issues%20from%20a%20video%20file%20within%20cloud%20computing%20environment.pdf |
Similar Items
An efficient mathematical analysis for saving energy in WSN routing protocol
by: Ibbini, Emad Mohammed, et al.
Published: (2015)
by: Ibbini, Emad Mohammed, et al.
Published: (2015)
Fuzzy logic system and mediation device node with grids for energy saving in wireless sensor network
by: Salameh, Emad Mohammed Ibbini
Published: (2019)
by: Salameh, Emad Mohammed Ibbini
Published: (2019)
A survey of routing MAC techniques for wireless sensor networks routing protocol
by: Mohammed Ibbini, Emad, et al.
Published: (2015)
by: Mohammed Ibbini, Emad, et al.
Published: (2015)
Trusting Cloud Computing for Personal Files
by: Mazlina, Abdul Majid, et al.
Published: (2014)
by: Mazlina, Abdul Majid, et al.
Published: (2014)
Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
by: Naji, Ahmed Wathik, et al.
Published: (2009)
by: Naji, Ahmed Wathik, et al.
Published: (2009)
Novel framework for hidden data in the image page within
executable file using computation between advanced encryption standard and distortion techniques
by: Naji, Ahmed Wathik, et al.
Published: (2009)
by: Naji, Ahmed Wathik, et al.
Published: (2009)
Cloud computing: issues and challenges
by: Dillon, Tharam S., et al.
Published: (2010)
by: Dillon, Tharam S., et al.
Published: (2010)
Static and self-scalable filter range selection algorithms for peer-to-peer networks
by: Kweh, Yeah Lun
Published: (2011)
by: Kweh, Yeah Lun
Published: (2011)
Cloud computing review: Features and issues
by: Al-Ahmad, Ahmad Salah, et al.
Published: (2018)
by: Al-Ahmad, Ahmad Salah, et al.
Published: (2018)
A review on mobile cloud computing and issues in it
by: Hakak, Saqib Iqbal, et al.
Published: (2013)
by: Hakak, Saqib Iqbal, et al.
Published: (2013)
Data Security Issues In Cloud Computing: Review
by: Ahmed, Hussam Alddin Shihab, et al.
Published: (2016)
by: Ahmed, Hussam Alddin Shihab, et al.
Published: (2016)
An investigation on cloud computing adoption within information technology companies
by: Mohammadi, A., et al.
Published: (2021)
by: Mohammadi, A., et al.
Published: (2021)
Issue of hiring a criminal
by: Ismail, Fadillah, et al.
Published: (2020)
by: Ismail, Fadillah, et al.
Published: (2020)
Survey of Service Description Languages and Their Issues in Cloud Computing
by: Sun, Le, et al.
Published: (2012)
by: Sun, Le, et al.
Published: (2012)
Cloud computing issues, challenges, and needs: A survey
by: Aljanabi, Mohammad, et al.
Published: (2021)
by: Aljanabi, Mohammad, et al.
Published: (2021)
Statistical selection algorithm for peer-to-peer system
by: Othman, Mohamed, et al.
Published: (2008)
by: Othman, Mohamed, et al.
Published: (2008)
Revisit of statistical selection algorithm for peer-to-peer system
by: Othman, Mohamed, et al.
Published: (2008)
by: Othman, Mohamed, et al.
Published: (2008)
Improvement and performance analysis on statistical selection algorithms
by: Kweh, Yeah Lun, et al.
Published: (2006)
by: Kweh, Yeah Lun, et al.
Published: (2006)
SmartCrowd: novel approach to big crowd management using mobile cloud computing
by: Ali, Mohammed Fazil, et al.
Published: (2015)
by: Ali, Mohammed Fazil, et al.
Published: (2015)
Factors Influencing the Continuous Use of Cloud Computing Services in Organization Level
by: Al-Sharafi, Mohammed A., et al.
Published: (2017)
by: Al-Sharafi, Mohammed A., et al.
Published: (2017)
New system for secure cover file of hidden data in the image page within executable file using statistical Steganography Techniques
by: Islam, Md. Rafiqul, et al.
Published: (2009)
by: Islam, Md. Rafiqul, et al.
Published: (2009)
Challenges of hidden data in the unused area two within executable files
by: Naji, Ahmed Wathik, et al.
Published: (2009)
by: Naji, Ahmed Wathik, et al.
Published: (2009)
Cloud computing in e-commerce in palestine: legal issues and challenges
by: Hasan, Yahya Y. F., et al.
Published: (2015)
by: Hasan, Yahya Y. F., et al.
Published: (2015)
Cloud computing in E-Commerce in Palestine: legal issues and challenges
by: Hasan, Yahya Y. F., et al.
Published: (2015)
by: Hasan, Yahya Y. F., et al.
Published: (2015)
Factors Affecting the Continuous Use of Cloud Computing Services from Expert's Perspective
by: Al-Sharafi, Mohammed A., et al.
Published: (2017)
by: Al-Sharafi, Mohammed A., et al.
Published: (2017)
The enemy within: criminal law and ideology in interwar Romania
by: Cercel, Cosmin Sebastian
Published: (2015)
by: Cercel, Cosmin Sebastian
Published: (2015)
Conceptual SLA Framework for Cloud Computing
by: Alhamad, Mohammed, et al.
Published: (2010)
by: Alhamad, Mohammed, et al.
Published: (2010)
Response time for cloud computing providers
by: Alhamad, Mohammed, et al.
Published: (2010)
by: Alhamad, Mohammed, et al.
Published: (2010)
SLA-based trust model for secure cloud computing
by: Alhamad, Mohammed
Published: (2011)
by: Alhamad, Mohammed
Published: (2011)
Digital filing and file control system (DFFCS)
by: Teh, Suet Khim
Published: (2005)
by: Teh, Suet Khim
Published: (2005)
Issues on enforcement of Islamic criminal law in Malaysia
by: Ab Aziz, Shamrahayu
Published: (2011)
by: Ab Aziz, Shamrahayu
Published: (2011)
SLA-Based Trust Model for Cloud Computing
by: Alhamad, Mohammed, et al.
Published: (2010)
by: Alhamad, Mohammed, et al.
Published: (2010)
International center for monitoring cloud computing providers (ICMCCP) for ensuring trusted clouds
by: Mohammed, Mohssen M. Z. E., et al.
Published: (2014)
by: Mohammed, Mohssen M. Z. E., et al.
Published: (2014)
Questionnaire Development Process to Measure the SMEs' Continuous Use behavior towards Cloud Computing Services
by: Al-Sharafi, Mohammed A., et al.
Published: (2019)
by: Al-Sharafi, Mohammed A., et al.
Published: (2019)
Testing file
by: Ilina, Musa
Published: (2014)
by: Ilina, Musa
Published: (2014)
Corrupt File
by: Cinanni, Gina
Published: (2013)
by: Cinanni, Gina
Published: (2013)
An optimal tasks scheduling algorithm based on QoS in cloud computing network
by: Alhakimi, Mohammed Ameen Mohammed Abdo
Published: (2017)
by: Alhakimi, Mohammed Ameen Mohammed Abdo
Published: (2017)
Cloud Security in 21st Century: Current Key Issues in Service Models on Cloud Computing and how to overcome them
by: Sharma, Supern
Published: (2011)
by: Sharma, Supern
Published: (2011)
The importance of monitoring cloud computing: An intensive review
by: Fahad, Ahmed Mohammed, et al.
Published: (2017)
by: Fahad, Ahmed Mohammed, et al.
Published: (2017)
A survey on SLA and performance measurement in cloud computing
by: Alhamad, Mohammed, et al.
Published: (2011)
by: Alhamad, Mohammed, et al.
Published: (2011)
Similar Items
-
An efficient mathematical analysis for saving energy in WSN routing protocol
by: Ibbini, Emad Mohammed, et al.
Published: (2015) -
Fuzzy logic system and mediation device node with grids for energy saving in wireless sensor network
by: Salameh, Emad Mohammed Ibbini
Published: (2019) -
A survey of routing MAC techniques for wireless sensor networks routing protocol
by: Mohammed Ibbini, Emad, et al.
Published: (2015) -
Trusting Cloud Computing for Personal Files
by: Mazlina, Abdul Majid, et al.
Published: (2014) -
Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
by: Naji, Ahmed Wathik, et al.
Published: (2009)