Search Results - (( developing copy detection algorithm ) OR ( java implication tree algorithm ))

  • Showing 1 - 13 results of 13
Refine Results
  1. 1

    A keypoint based copy-move forgery detection and localization in digital images / Somayeh Sadeghi by Somayeh, Sadeghi

    Published 2015
    “…The true and false positive rates achieved by the proposed algorithm outperform several current detection algorithms.…”
    Get full text
    Get full text
    Thesis
  2. 2

    Depth frame loss concealment for wireless transmission utilising motion detection information by Ranjbari, Mohamadreza

    Published 2014
    “…The methods are able to facilitate a frame copy algorithm and a high correlation of colour and depth frames to conceal depth frame loss. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Online Tool to Detect Plagiarized Students' Solutions for Classes' Assignments by Khdair, Hisham S.M

    Published 2010
    “…The aim of this study is to develop an online tool to detect plagiarism and cheating for students' assignments focusing on those who copy from each others'. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Face Detection System / Chan Beh Teng by Chan, Beh Teng

    Published 2004
    “…The system will generate an output where every detected face will be indicated with a rectangle on a copy of the original image. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Region duplication forgery detection technique based on keypoint matching / Diaa Mohammed Hassan Uliyan by Diaa , Mohammed Hassan Uliyan

    Published 2016
    “…Furthermore, the proposed methods are resistant to forgery where small up to 8*8 pixels and flat regions are involved, with little visual structures. The average detection rate of our algorithm maintained 96 % true positive rate and 7 % false positive rate which outperform several current detection methods. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Relevance detection and summarizing strategies identification algorithm using linguistic measures / Seyed Asadollah Abdiesfandani by Seyed Asadollah, Abdiesfandani

    Published 2016
    “…The system is also able to detect copy- verbatim strategy, the most commonly strategy used by students. …”
    Get full text
    Get full text
    Thesis
  8. 8

    An enhanced soft set data reduction using decision partition order technique by Mohammed, Mohammed Adam Taheir

    Published 2017
    “…The decomposition scenario in Rose’s and Kumar’s algorithms detects the reduction, but could not obtain the optimal decision. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Integrated analysis of copy number and loss of heterozygosity in primary breast carcinomas using high-density SNP array by Ching, H.C., Naidu, R., Seong, M.K., Har, Y.C., Taib, N.A.

    Published 2011
    “…This will facilitate the uncovering of true driver genes pertinent to breast cancer biology and the develop-ment of prospective therapeutics.…”
    Get full text
    Get full text
    Article
  10. 10
  11. 11

    Image splicing forgery detection based on low-dimensional singular value decomposition of discrete cosine transform coefficients by Moghaddasi, Zahra, Jalab, Hamid Abdullah, Noor, Rafidah Md

    Published 2019
    “…Digital image forgery has significantly increased due to the rapid development of several tools of image manipulation. …”
    Get full text
    Get full text
    Article
  12. 12

    Smart room system with dual authentication by Harun, Muhammad Hazmi, Abdul Rahid@Abdul Rashid, Nurul Najwa

    Published 2025
    “…It uses the Histogram of Oriented Gradients (HOG) algorithm for face recognition, which results in lower power consumption and faster processing. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13