Search Results - (( java application need algorithm ) OR ( frequency identification task algorithm ))
Search alternatives:
- identification task »
- java application »
- application need »
- need algorithm »
- task algorithm »
-
1
Educational project on a simple voice identification using mel-frequency cepstrum coefficients and vector quantization
Published 2008“…The estimation fundamental frequency is performed with Harmonic Product Spectrum (HPS) algorithm, whilst MFCC is calculated using Discrete Cosine Transform, then, is modeled with Vector Quantization to compress the size of data to be processed and to assist identification.…”
Get full text
Get full text
Proceeding Paper -
2
Relevance detection and summarizing strategies identification algorithm using linguistic measures / Seyed Asadollah Abdiesfandani
Published 2016“…The algorithm simulates two important tasks that are frequently used by the human experts to identify summarizing strategies used to produce the summary sentences: 1) sentences relevance identification; and 2) summarizing strategies identification. …”
Get full text
Get full text
Thesis -
3
Key concept identification: A comprehensive analysis of frequency and topical graph-based approaches
Published 2018“…The objective of the study presented in this paper is to perform a comprehensive empirical analysis of selected frequency and topical graph-based algorithms for key concept extraction on three different datasets, to identify the major sources of error in these approaches. …”
Get full text
Get full text
Article -
4
Key concept identification: A comprehensive analysis of frequency and topical graph-based approaches
Published 2018“…The objective of the study presented in this paper is to perform a comprehensive empirical analysis of selected frequency and topical graph-based algorithms for key concept extraction on three different datasets, to identify the major sources of error in these approaches. …”
Get full text
Get full text
Article -
5
An improved plant identification system by Fuzzy c-means bag of visual words model and sparse coding
Published 2020“…Sparse representation prevents over-fitting in the classifier by eliminating redundancies and evaluating high-frequency patterns between feature vectors. Performance of proposed methods surpass the classic bag of words algorithm for plant identification tasks.…”
Get full text
Get full text
Get full text
Article -
6
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
7
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
-
9
Electromygraphy (EMG) signal based hand gesture recognition using Artificial Neural Network (ANN)
Published 2011“…A back-propagation (BP) network with Levenberg-Marquardt training algorithm has been used for the detection of gesture. …”
Get full text
Get full text
Get full text
Proceeding Paper -
10
Speaker identification through feature fusion based deep learning / Rashid Jahangir
Published 2021“…In the speaker identification process, extracting discriminative and salient features from speaker utterances is an important task to accurately identify speakers. …”
Get full text
Get full text
Thesis -
11
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…A design proposal was outlined to provide an adaptive client/server approach to stream audio contents using Real-Time Transport Protocol (RTP) involving architecture based on the Java Media Framework (JMF) Application Programmable Interfaces (API).RTP protocol is the Internet-standard protocol for the transport of real-time data, including audio and video and can be implemented by using Java Media Framework (JMF). …”
Get full text
Get full text
Thesis -
12
Parallel distributed genetic algorithm development based on microcontrollers framework
Published 2023Conference paper -
13
Network game (Literati) / Chung Mei Kuen
Published 2003“…Therefore, efficient and robust servers that process separate client connections in separate threads are needed. Java applet is a well-known and widely used example of mobile code (a variation on the traditional client-server model). …”
Get full text
Get full text
Thesis -
14
Automated time series forecasting
Published 2011Get full text
Get full text
Get full text
Monograph -
15
Optimization of RFID network planning for monitoring railway mechanical defects based on gradient-based Cuckoo search algorithm
Published 2020“…Radio Frequency Identification (RFID) is an increasingly widespread and applied technology of automatic real-time monitoring and control railway assets. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
16
KP-Rank: a semantic-based unsupervised approach for keyphrase extraction from text data
Published 2021“…In the proposed approach, we exploited Latent Semantic Analysis (LSA) and clustering techniques and a novel frequency-based algorithm for candidate ranking is introduced which considers locality-based sentence, paragraph and section frequencies. …”
Get full text
Get full text
Article -
17
Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli
Published 2019“…The programming language that is used to write the program is Java Language that will run on android phones. As the result, this project was tested on the functionality of the mobile messaging application. …”
Get full text
Get full text
Student Project -
18
Design Of Robot Motion Planning Algorithm For Wall Following Robot
Published 2006Get full text
Get full text
Monograph -
19
Effective query structuring with ranking using named entity categories for XML retrieval
Published 2016“…Furthermore, it employs Predicates Identification Algorithm (PIA) and Entity Identification Algorithm (EIA) to identify user search intention. …”
Get full text
Get full text
Get full text
Thesis -
20
Text messaging encryption system
Published 2012Get full text
Get full text
Undergraduates Project Papers
