Search Results - (( java _ implementation algorithm ) OR ( problem recognition system algorithm ))

Search alternatives:

Refine Results
  1. 1

    Face recognition and identification system (FaceRec) / Khew Jye Huei by Khew , Jye Huei

    Published 2004
    “…It describes the implementation and functions of a working system that performs the recognition and identification of human faces using the implement algorithms. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Integration Of Unsupervised Clustering Algorithm And Supervised Classifier For Pattern Recognition by Leong, Shi Xiang

    Published 2017
    “…In pattern recognition system, achieving high accuracy in pattern classification is crucial. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Utilisation of Exponential-Based Resource Allocation and Competition in Artificial Immune Recognition System by Hormozi, Shahram Golzari

    Published 2011
    “…This thesis proposes new algorithms based on Artificial Immune Recognition System to address the mentioned weaknesses and improve the performance of the Artificial Immune Recognition System. …”
    Get full text
    Get full text
    Thesis
  4. 4

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…Today, with online marketing, banking, healthcare and other services, even the average householder is aware of encryption. The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  5. 5

    Old Jawi manuscript: Digital recognition / Zaidi Razak by Zaidi, Razak

    Published 2016
    “…The literature review in this research looks at works conducted in the past on line and character segmentation as well as recognition systems. The information gathered is useful for the development of a line segmentation algorithm, a new character segmentation algorithm, as well as a recognition algorithm which is based on the use of a unique code and Hamming distance calculation. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Jogging activity recognition using k-NN algorithm by Afifah Ismail

    Published 2022
    “…Jogging activity recognition using the k-NN algorithm is a system that can help users collect information data of user speed movement using speed sensor and give the classification of jogging activity to the user. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  8. 8

    Character classification for license plate recognition system based on image processing using MATLAB by Hashim, Mustafa Adil

    Published 2016
    “…A License Plate Recognition System (LPRS) is one of the most important systems used for monitoring and controlling transportation and traffic in many countries. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Static hand gesture recognition using artificial neural network / Haitham Sabah Hasan by Hasan, Haitham Sabah

    Published 2014
    “…Artificial neural network is built for the purpose of classification by using the back- propagation learning algorithm. The proposed system presents a recognition algorithm to recognize a set of six specific static hand gestures, namely: Open, Close, Cut, Paste, Maximize, and Minimize. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Modem Recognition Algorithm for Software Defined Radio Base Station by Rukumangatha Rajah, Sivaraman

    Published 2004
    “…The root cause of the problem is that the current hardware is not flexible enough to support future communication systems. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    Automated plant recognition system based on multi-objective parallel genetic algorithm and neural network by Sefidgar, Seyed Mohammad Hossein

    Published 2014
    “…The problem with the existing plant recognition system is the lack of method to find the best structure for their classifiers. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    Fingerprint recognition system by Rohani, Abu Bakar

    Published 2005
    “…Fingerprint recognition is the oldest method which has been used in numerous applications for identification purpose in many social conditions such as access control and crime investigation.Now a day,in the era of technology the system is still using the password or smart card as an identity character for identification purpose.The problems happen when user forgot their password or lost their smart card. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  16. 16

    Provider independent cryptographic tools by Ibrahim, Subariah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
    Get full text
    Get full text
    Get full text
    Monograph
  17. 17

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  18. 18

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Handwritten Character Recognition System Using Neural Network by Kuryati, Kipl

    Published 2004
    “…In this project, a software system capable of recognizing alphabet and digit characters incorporated with neural network algorithm was developed using MATLAB neural network toolbox. …”
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  20. 20