Search Results - (( developing _ recognition algorithm ) OR ( java implementation learning algorithm ))

Refine Results
  1. 1

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    An Educational Tool Aimed at Learning Metaheuristics by Kader, Md. Abdul, Jamaluddin, Jamal A., Kamal Z., Zamli

    Published 2020
    “…Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment by Ruzita, Ahmad

    Published 2013
    “…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Letter recognition using backpropagation algorithm by Azrul Hafiz, Awang

    Published 2010
    “…Letter Recognition using Backpropagation Algorithm is an application to analyze the letter data and the performance of Backpropagation Neural Network in letter recognition. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  6. 6

    Old Jawi manuscript: Digital recognition / Zaidi Razak by Zaidi, Razak

    Published 2016
    “…This research did not use artificial intelligence techniques to achieve the research goal. The algorithms developed in this research were evaluated against similar algorithms for other recognition methods. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
    Get full text
    Get full text
    Thesis
  9. 9

    VOICE RECOGNITION FOR SECURITY PURPOSES by NOOR ROZALI, NOOR ROHAIZAD

    Published 2007
    “…This report presents the implementation of Voice Recognition System for Security Purposes. The scope of study is to understand the existing algorithms and develop a brand new algorithm which is better in terms of its reliability and accuracy. …”
    Get full text
    Get full text
    Final Year Project
  10. 10

    Car plate recognition system : (segmentation) by Nor Helmy Effendy, Meon

    Published 2005
    “…However, in this research, it only focuses on two phases of the recognition phase which are car plate thinning phase and car plate segmentation phase.The technique that was used in every phase is based on the algorithms that are developed by previous researchers. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  11. 11

    Face recognition using PZMI, ANN and Ant colony algorithms / Milad Miri by Milad , Miri

    Published 2018
    “…Algorithms developed for face recognition are tightly related to the rate of extracted face features. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Algorithm of face recognition by principal component analysis by Al-Khateeb, Khalid A. Saeed, Yeop Johari, Jaiz Anuar

    Published 2002
    “…A face recognition algorithm based on Principal Component Analysis (PCA) has been developed and tested for computer vision applications. …”
    Get full text
    Get full text
    Article
  13. 13

    Weed recognition based on erosion and dilation segmentation algorithm by S., Sulaiman, M.H., Siddiqi, I., Ahmad

    Published 2009
    “…Many attempts have been made to develop efficient algorithms for recognition and classification. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    A Comparison Study On Pca_Modular Pca And Lda For Face Recognition by Cheah, Boon Wah

    Published 2017
    “…Many face recognition algorithms have been developed and modified by researchers. …”
    Get full text
    Get full text
    Monograph
  15. 15

    Jogging activity recognition using k-NN algorithm by Afifah Ismail

    Published 2022
    “…The objective of this project are 1) to investigate human activity recognition (HAR) for jogging activity and k-Nearest Neighbors (k-NN) algorithm for jogging classifier, 2) to apply HAR AND k-NN for jogging recognition and classification and, 3) to test the functionality of the k-NN algorithm of jogging recognition and classification. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  16. 16

    Dynamic Bayesian networks and variable length genetic algorithm for designing cue-based model for dialogue act recognition by Yahya, Anwar Ali, Mahmod, Ramlan, Ramli, Abd Rahman

    Published 2010
    “…The model is evaluated against two previously proposed models and the results confirm the potentiality of dynamic Bayesian networks for dialogue act recognition. In the second stage, the developed variable length genetic algorithm is used to select different sets of lexical cues to constitute the dynamic Bayesian networks' random variables. …”
    Get full text
    Get full text
    Article
  17. 17

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Animal voice recognition for identification (ID) detection system by Yeo, Che Yong, Syed Mohamed, Syed Abdul Rahman Al-Haddad, Ng, Chee Kyun

    Published 2011
    “…In this paper, an animal identification (ID) detection system based on animal voice pattern recognition algorithm has been developed. The developed animal voice recognition system uses the zero-cross-rate (ZCR), Mel-Frequency Cepstral Coefficients (MFCC) and Dynamic Time Warping (DTW) joint algorithms as the tools for recognizing the voice of the particular animal. …”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    DEVELOPMENT OF IRIS RECOGNITION SYSTEM by Mohd Kamarudin, Nur Eliza

    Published 2016
    “…Uniqueness of iris is proven can increase the security and efficiency of recognition system. The “objective of this” project “is to develop” a secure “iris recognitionalgorithm for identification management and access control. …”
    Get full text
    Get full text
    Final Year Project
  20. 20

    Development of Image Recognition for Underwater Vehicle Applications by Syed Abdul Hamid , Syed Mohamad Shazali, Mohd Aras, Mohd Shahrieel, Ali, Fara Ashikin, Anuar , Mohamed Kassim, Abdul Azis, Fadilah

    Published 2011
    “…This project focuses on development of algorithm for image recognition of images from vision system for underwater vehicle applications. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item