Search Results - (( java implementation path algorithm ) OR ( writer classification _ algorithm ))
Search alternatives:
- writer classification »
- java implementation »
- implementation path »
- path algorithm »
-
1
Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer
Published 2017“…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
Get full text
Get full text
Thesis -
2
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
Get full text
Get full text
Thesis -
3
Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment
Published 2021“…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
Smart appointment organizer for mobile application / Mohd Syafiq Adam
Published 2009“…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
Get full text
Get full text
Thesis -
5
Improved random forest for feature selection in writer identification
Published 2015“…Writer Identification (WI) is a process to determine the writer of a given handwriting sample. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
6
Discretization of integrated moment invariants for writer identification
Published 2008“…Subsequently, the discrete proposed features undertake discretization procedure prior to classification for better feature representation and splendid classification accuracy. …”
Get full text
Get full text
Conference or Workshop Item -
7
A New Swarm-Based Framework for Handwritten Authorship Identification in Forensic Document Analysis
Published 2014“…Therefore, feature extraction and selection of the unique individual significant features are very important in order to identify the writer, moreover to improve the classification accuracy. …”
Get full text
Get full text
Book Chapter -
8
A new swarm-based framework for handwritten authorship identification in forensic document analysis
Published 2014“…Therefore, feature extraction and selection of the unique individual significant features are very important in order to identify the writer, moreover to improve the classification accuracy. …”
Get full text
Get full text
Book Chapter -
9
Arabic Calligraphy Classification using Triangle Model for Digital Jawi Paleography Analysis
Published 2011“…Calligraphy classification of the ancient manuscripts gives useful information to paleographers. …”
Get full text
Get full text
Conference or Workshop Item -
10
Identifying Cyberspace Users� Tendency in Blog Writing Using Machine Learning Algorithms
Published 2023“…A blog is a platform where a writer or group of writers gives their opinion on a specific topic. …”
Get full text
Get full text
Article -
11
Arabic Calligraphy Classification using Triangle Model for Digital Jawi Paleography Analysis
Published 2011“…Calligraphy classification of the ancient manuscripts gives useful information to paleographers. …”
Get full text
Get full text
Conference or Workshop Item -
12
Features Extraction of Arabic Calligraphy using extended Triangle Model for Digital Jawi Paleography Analysis
Published 2013“…The information helps paleographer to identify date, writer, number of writers, place of origin, and the originality of manuscripts. …”
Get full text
Get full text
Article -
13
Invariants discretization for individuality representation in handwritten authorship
Published 2008“…Writer identification is one of the areas in pattern recognition that have created a center of attention by many researchers to work in. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Beyond Sentiment Analysis: A Review of Recent Trends in Text Based Sentiment Analysis and Emotion Detection
Published 2023“…This is because emotions are the finer grained information which could be extracted from opinions. So besides writer sentiments, writer emotion is also a valuable data. …”
Get full text
Get full text
Get full text
Get full text
Article -
15
Detection and analysis of fake reviews on online service portal
Published 2022“…In this paper, a framework of a Machine Learning based fake review detection model has been proposed to identify which classification algorithm is the most effective with the proposed framework.…”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
16
Ensemble based categorization and adaptive model for malware detection
Published 2011“…In this paper, we propose an ensemble categorization by using ensemble classification and clustering together with adaptive learning model. …”
Get full text
Get full text
Get full text
Article -
17
Android: S-Based Technique in Mobile Malware Detection
Published 2018“…This framework uses signature number and Secure Hash Algorithm (SHA) as signature in the detection process. …”
Get full text
Get full text
Get full text
Article -
18
Evolutionary cost-cognizant regression test case prioritization for object-oriented programs
Published 2019“…Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
Get full text
Get full text
Thesis
