Search Results - (( developing user identification algorithm ) OR ( java segmentation using algorithm ))

Refine Results
  1. 1

    Image clustering comparison of two color segmentation techniques by Subramaniam, Kavitha Pichaiyan

    Published 2010
    “…Finally, the algorithm found, which would solve the image segmentation problem.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Automatic Number Plate Recognition on android platform: With some Java code excerpts by ., Abdul Mutholib, Gunawan, Teddy Surya, Kartiwi, Mira

    Published 2016
    “…On the other hand, the traditional algorithm using template matching only obtained 83.65% recognition rate with 0.97 second processing time. …”
    Get full text
    Get full text
    Get full text
    Book
  3. 3
  4. 4

    Development of person identification application for video surveillance by Soon, Phaik Ching

    Published 2022
    “…It increases the human cost of video surveillance. Hence, person identification by the video surveillance application is developed in this project. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  5. 5

    DEVELOPMENT OF IRIS RECOGNITION SYSTEM by Mohd Kamarudin, Nur Eliza

    Published 2016
    “…The “objective of this” project “is to develop” a secure “iris recognition” algorithm for identification management and access control. …”
    Get full text
    Get full text
    Final Year Project
  6. 6

    Tag clouds algorithm with the inclusion of personality traits by Ahmad Affandi, Supli

    Published 2015
    “…Therefore, the main objective of this study is to develop an algorithm that can adapt visual features of tag cloud layout styles based on personality traits of the user. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    An indoor based push notification for location-based marketing using bluetooth smart ready technology / Nur Farehah Alias by Alias, Nur Farehah

    Published 2017
    “…Therefore, this project has proposed a method called token based alert notification. There are three algorithm developed for token based alert notification which is tokenization algorithm, token matching algorithm and item identification algorithm. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Effective query structuring with ranking using named entity categories for XML retrieval by Roko, Abubakar

    Published 2016
    “…Furthermore, it employs Predicates Identification Algorithm (PIA) and Entity Identification Algorithm (EIA) to identify user search intention. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    A Model for Evaluation of Cryptography Algorithm on UUM Portal by Norliana, Abdul Majid

    Published 2004
    “…Level one is the development of userID and password, level two involve the insertion of the testing parameter speed coding. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Identifying the influential spreaders in multilayer interactions of online social networks by Al-Garadi, M.A., Varathan, Kasturi Dewi, Ravana, S.D., Ahmed, E., Chang, V.

    Published 2016
    “…In this paper, the effects of different topological network structure on influential spreaders identification are investigated. The results analysis concluded that improving the accuracy of influential spreaders identification in OSNs is not only by improving identification algorithms but also by developing a network topology that represents the information diffusion well. …”
    Get full text
    Get full text
    Article
  11. 11

    Development of interactive application for classification of Artocarpus Species by Abdul Ghapar, Nadia

    Published 2020
    “…This study capable to provide the results for current accuracy data representation of the selected Artocarpus species. The development of Graphical User Interface (GUI) for classification of Artocarpus species help user to identify and differentiate the species in faster and easier way especially botanist, taxonomist, and researcher. …”
    Get full text
    Undergraduate Final Project Report
  12. 12

    Online fingerprint recognition by Khairul Bariyah, Abd Rahim

    Published 2010
    “…For minutiae matching, the matching algorithm has been developed. This algorithm is capable of finding the correspondences between minutiae in the input image and store template. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17

    Big Data Mining Using K-Means and DBSCAN Clustering Techniques by Fawzia Omer, A., Mohammed, H.A., Awadallah, M.A., Khan, Z., Abrar, S.U., Shah, M.D.

    Published 2022
    “…The density-based spatial clustering of applications with noise (DBSCAN) and the K-means algorithm were used to develop clustering algorithms. …”
    Get full text
    Get full text
    Article
  18. 18

    Investigating optimal smartphone placement for identifying stairs movement using machine learning by Muhammad Ruhul Amin, Shourov, Husman, Muhammad Afif, Toha, Siti Fauziah, Jasni, Farahiyah

    Published 2023
    “…Accurate identification of human activities is crucial in conveying essential gait information to users for the recognition of human movement activities. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  19. 19
  20. 20

    Fingerprint recognition system by Rohani, Abu Bakar

    Published 2005
    “…Fingerprint recognition is the oldest method which has been used in numerous applications for identification purpose in many social conditions such as access control and crime investigation.Now a day,in the era of technology the system is still using the password or smart card as an identity character for identification purpose.The problems happen when user forgot their password or lost their smart card. …”
    Get full text
    Get full text
    Undergraduates Project Papers