Search Results - (( java _ implementation algorithm ) OR ( problem recognition system algorithm ))
Search alternatives:
- implementation algorithm »
- system algorithm »
-
1
Face recognition and identification system (FaceRec) / Khew Jye Huei
Published 2004“…It describes the implementation and functions of a working system that performs the recognition and identification of human faces using the implement algorithms. …”
Get full text
Get full text
Thesis -
2
Integration Of Unsupervised Clustering Algorithm And Supervised Classifier For Pattern Recognition
Published 2017“…In pattern recognition system, achieving high accuracy in pattern classification is crucial. …”
Get full text
Get full text
Thesis -
3
Utilisation of Exponential-Based Resource Allocation and Competition in Artificial Immune Recognition System
Published 2011“…This thesis proposes new algorithms based on Artificial Immune Recognition System to address the mentioned weaknesses and improve the performance of the Artificial Immune Recognition System. …”
Get full text
Get full text
Thesis -
4
RSA Encryption & Decryption using JAVA
Published 2006“…Today, with online marketing, banking, healthcare and other services, even the average householder is aware of encryption. The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
5
Old Jawi manuscript: Digital recognition / Zaidi Razak
Published 2016“…The literature review in this research looks at works conducted in the past on line and character segmentation as well as recognition systems. The information gathered is useful for the development of a line segmentation algorithm, a new character segmentation algorithm, as well as a recognition algorithm which is based on the use of a unique code and Hamming distance calculation. …”
Get full text
Get full text
Thesis -
6
Image recognition using Artificial Immune systems approach
Published 2009Get full text
Working Paper -
7
Jogging activity recognition using k-NN algorithm
Published 2022“…Jogging activity recognition using the k-NN algorithm is a system that can help users collect information data of user speed movement using speed sensor and give the classification of jogging activity to the user. …”
Get full text
Get full text
Get full text
Academic Exercise -
8
Character classification for license plate recognition system based on image processing using MATLAB
Published 2016“…A License Plate Recognition System (LPRS) is one of the most important systems used for monitoring and controlling transportation and traffic in many countries. …”
Get full text
Get full text
Thesis -
9
-
10
Static hand gesture recognition using artificial neural network / Haitham Sabah Hasan
Published 2014“…Artificial neural network is built for the purpose of classification by using the back- propagation learning algorithm. The proposed system presents a recognition algorithm to recognize a set of six specific static hand gestures, namely: Open, Close, Cut, Paste, Maximize, and Minimize. …”
Get full text
Get full text
Thesis -
11
Modem Recognition Algorithm for Software Defined Radio Base Station
Published 2004“…The root cause of the problem is that the current hardware is not flexible enough to support future communication systems. …”
Get full text
Get full text
Thesis -
12
A speech recognition system based on structure equivalent fuzzy neural network trained by firefly algorithm
Published 2012Get full text
Working Paper -
13
Automated plant recognition system based on multi-objective parallel genetic algorithm and neural network
Published 2014“…The problem with the existing plant recognition system is the lack of method to find the best structure for their classifiers. …”
Get full text
Get full text
Thesis -
14
-
15
Fingerprint recognition system
Published 2005“…Fingerprint recognition is the oldest method which has been used in numerous applications for identification purpose in many social conditions such as access control and crime investigation.Now a day,in the era of technology the system is still using the password or smart card as an identity character for identification purpose.The problems happen when user forgot their password or lost their smart card. …”
Get full text
Get full text
Undergraduates Project Papers -
16
Provider independent cryptographic tools
Published 2003“…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
Get full text
Get full text
Get full text
Monograph -
17
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
18
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
19
Handwritten Character Recognition System Using Neural Network
Published 2004“…In this project, a software system capable of recognizing alphabet and digit characters incorporated with neural network algorithm was developed using MATLAB neural network toolbox. …”
Get full text
Get full text
Final Year Project Report / IMRAD -
20
Eigenface based algorithms to regognize noisy and occluded faces
Published 2011Get full text
Thesis
