Search Results - (( java implementation path algorithm ) OR ( writer classification using algorithm ))
Search alternatives:
- writer classification »
- classification using »
- java implementation »
- implementation path »
- using algorithm »
- path algorithm »
-
1
Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer
Published 2017“…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
Get full text
Get full text
Thesis -
2
Improved random forest for feature selection in writer identification
Published 2015“…Important features are measured by using Variable Importance (VI). While Mean Absolute Error (MAE) values use to identify the variance between writers, VI value was used for splitting process in tree and MAE value is to ensure the intra-class (same writer) invariance is lower than inter-class (different writer) invariance because lower intra-class invariance indicates accuracy to the real author. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
3
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
Get full text
Get full text
Thesis -
4
Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment
Published 2021“…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
Get full text
Get full text
Get full text
Get full text
Article -
5
Smart appointment organizer for mobile application / Mohd Syafiq Adam
Published 2009“…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
Get full text
Get full text
Thesis -
6
Discretization of integrated moment invariants for writer identification
Published 2008“…The results disclose that the proposed discretized invariants reveal 99% accuracy of classification by using 3520 training data and 880 testing data.…”
Get full text
Get full text
Conference or Workshop Item -
7
A New Swarm-Based Framework for Handwritten Authorship Identification in Forensic Document Analysis
Published 2014“…Its principal point is in forensics and biometric application as such the writing style can be used as bio-metric features for authenticating the identity of a writer. …”
Get full text
Get full text
Book Chapter -
8
A new swarm-based framework for handwritten authorship identification in forensic document analysis
Published 2014“…Its principal point is in forensics and biometric application as such the writing style can be used as bio-metric features for authenticating the identity of a writer. …”
Get full text
Get full text
Book Chapter -
9
Arabic Calligraphy Classification using Triangle Model for Digital Jawi Paleography Analysis
Published 2011“…Calligraphy classification of the ancient manuscripts gives useful information to paleographers. …”
Get full text
Get full text
Conference or Workshop Item -
10
Arabic Calligraphy Classification using Triangle Model for Digital Jawi Paleography Analysis
Published 2011“…Calligraphy classification of the ancient manuscripts gives useful information to paleographers. …”
Get full text
Get full text
Conference or Workshop Item -
11
Identifying Cyberspace Users� Tendency in Blog Writing Using Machine Learning Algorithms
Published 2023“…A blog is a platform where a writer or group of writers gives their opinion on a specific topic. …”
Get full text
Get full text
Article -
12
Features Extraction of Arabic Calligraphy using extended Triangle Model for Digital Jawi Paleography Analysis
Published 2013“…The style of writing or calligraphy applied in ancient manuscripts gives useful information to paleographers. The information helps paleographer to identify date, writer, number of writers, place of origin, and the originality of manuscripts. …”
Get full text
Get full text
Article -
13
Invariants discretization for individuality representation in handwritten authorship
Published 2008“…Its focal point is in forensics and biometric application as such the writing style can be used as biometric features for authenticating a writer. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Beyond Sentiment Analysis: A Review of Recent Trends in Text Based Sentiment Analysis and Emotion Detection
Published 2023“…This is because emotions are the finer grained information which could be extracted from opinions. So besides writer sentiments, writer emotion is also a valuable data. …”
Get full text
Get full text
Get full text
Get full text
Article -
15
Android: S-Based Technique in Mobile Malware Detection
Published 2018“…In order to overcome malware, concern in mobile, we propose a new framework for malware detection which is signature based technique using pattern matching. This framework uses signature number and Secure Hash Algorithm (SHA) as signature in the detection process. …”
Get full text
Get full text
Get full text
Article -
16
Ensemble based categorization and adaptive model for malware detection
Published 2011“…In this paper, we propose an ensemble categorization by using ensemble classification and clustering together with adaptive learning model. …”
Get full text
Get full text
Get full text
Article -
17
Detection and analysis of fake reviews on online service portal
Published 2022“…In this paper, a framework of a Machine Learning based fake review detection model has been proposed to identify which classification algorithm is the most effective with the proposed framework.…”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
18
Evolutionary cost-cognizant regression test case prioritization for object-oriented programs
Published 2019“…Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
Get full text
Get full text
Thesis
