Search Results - (( java implementation _ algorithm ) OR ( pattern extraction method algorithm ))
Search alternatives:
- java implementation »
- pattern extraction »
- extraction method »
- method algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The proposed method, XiFLEX has been implemented using two different techniques (java based & XQuery) and compared with the original FLEX algorithm in its basic implementation and the Apriori algorithm for frequent patterns generation. …”
Get full text
Get full text
Thesis -
2
Image clustering comparison of two color segmentation techniques
Published 2010“…There are many algorithm for analysing clustering each having its own method to do clustering. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
3
RSA Encryption & Decryption using JAVA
Published 2006“…Today, with online marketing, banking, healthcare and other services, even the average householder is aware of encryption. The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
4
Finger Vein Recognition Using Pattern Map As Feature Extraction
Published 2012“…This shows that pattern map is a reliable feature extraction method and is able to represent finger vein pattern effectively.…”
Get full text
Get full text
Thesis -
5
Realization Of The 1D Local Binary Pattern (LBP) Algorithm In Raspberry Pi For Iris Classification Using K-NN Classifier
Published 2018“…Classic local binary pattern (LBP) is one of the most useful feature extraction methods. …”
Get full text
Get full text
Monograph -
6
Provider independent cryptographic tools
Published 2003“…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
Get full text
Get full text
Get full text
Monograph -
7
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
8
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
9
HEP-2 CELL IMAGES CLASSIFICATION BASED ON STATISTICAL TEXTURE ANALYSIS AND FUZZY LOGIC
Published 2014“…This project proposes a pattern recognition algorithm consisting of statistical methods to extract seven textural features from the HEp-2 cell images followed by classification of staining patterns by using fuzzy logic. …”
Get full text
Get full text
Final Year Project -
10
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
Get full text
Get full text
Conference or Workshop Item -
11
Social media mining: a genetic based multiobjective clustering approach to topic modelling
Published 2021“…As the components of big data continue to expand, the task of extracting useful information becomes critical. Topic extraction refers to the process of extracting main topics from the pool of news feed and a typical method to perform topic extraction is through clustering. …”
Get full text
Get full text
Article -
12
Automatic Number Plate Recognition on android platform: With some Java code excerpts
Published 2016“…The main challenges of implementing ANPR algorithm on mobile phone are how to produce a higher coding efficiency, lower computational complexity, and higher scalability. …”
Get full text
Get full text
Get full text
Book -
13
Abnormal Pattern Detection In Ppg Signals Using Time Series Analysis
Published 2022“…This project’s objectives are to implement rule-based algorithm method for abnormal pattern detection in PPG signals, and to investigate the accuracy and performance of rule-based algorithm in detecting the abnormal pattern. …”
Get full text
Get full text
Undergraduates Project Papers -
14
Fingerprint verification using clonal selection algorithm / Farah Syadiyah Shamsudin
Published 2017“…Further studies can be made by using the same algorithm, but focusing more on the image enhancement and the feature extraction methods to improve the quality of the extraction of fingerprints.…”
Get full text
Get full text
Thesis -
15
Integration Of Unsupervised Clustering Algorithm And Supervised Classifier For Pattern Recognition
Published 2017“…However, further study is needed in the feature extraction and clustering algorithms part as the performance of the pattern classification is still depending on the data input.…”
Get full text
Get full text
Thesis -
16
Temporal - spatial recognizer for multi-label data
Published 2018“…Experiments on five datasets were conducted to compare the proposed method (imHTM) against statistical, template and structural pattern recognition methods. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
17
Social media mining: a genetic based multiobjective clustering approach to topic modelling
Published 2021“…As the components of big data continue to expand, the task of extracting useful information becomes critical. Topic extraction refers to the process of extracting main topics from the pool of news feed and a typical method to perform topic extraction is through clustering. …”
Get full text
Get full text
Get full text
Get full text
Article -
18
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…Java Media Framework library and the RTP protocol for audio transmission were used as development tools.The developed system designed in this thesis together with experimental results proved that the system could be implemented successfully. …”
Get full text
Get full text
Thesis -
19
Data mining using genetic algorithm in finance data / A. Noor Latiffah and A. B. Nordin
Published 2006“…The methods that wilt be applied are conventional statistical methods Markowitz Optimization as well as evolutionary programming (EP) utilizing genetic algorithms. …”
Get full text
Get full text
Conference or Workshop Item -
20
Neural Network Based Pattern Recognition in Visual Inspection System for Intergrated Circuit Mark Inspection
Published 1998“…Industrial visual machine inspection system uses template or feature matching methods to locate or inspect parts or pattern on parts. …”
Get full text
Get full text
Thesis
