Search Results - (( java implementation some algorithm ) OR ( automatic identification using algorithm ))

Refine Results
  1. 1

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Multichannel optimization with hybrid spectral- entropy markers for gender identification enhancement of emotional-based EEGs by Al-Qazzaz, Noor Kamal, Sabir, Mohannad K., Mohd Ali, Sawal Hamid, Ahmad, Siti Anom, Grammer, Karl

    Published 2021
    “…Finally, the k-nearest neighbors ( kNN) classification technique was used for automatic gender identification of an emotional-based EEG dataset. …”
    Get full text
    Get full text
    Article
  4. 4

    Feature extraction using spectral centroid and mel frequency cepstral coefficient for Quranic accent automatic identification by Kamarudin, Noraziahtulhidayu, Syed Mohamed, Syed Abdul Rahman Al-Haddad, Hashim, Shaiful Jahari, Nematollahi, Mohammad Ali, Hassan, Abd Rauf

    Published 2014
    “…This paper presents the process of Quranic Accent Automatic Identification. Recent feature extraction technique that is used for Quranic verse rule identification/Tajweed include Mel Frequency Cepstral Coefficients (MFCC) which prone to additive noise and may reduce the classification result. …”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5
  6. 6
  7. 7
  8. 8

    System Identification And Control Of Automatic Car Pedal Pressing System For Low-Speed Driving In A Road Traffic Delay by Lai, Chong Jin

    Published 2022
    “…Both controllers were then implemented and tested in automatic car pedal pressing system. The controller gains were tuned using metaheuristic algorithm which is Particle Swarm Algorithm (PSO) for optimal values of fuzzy controller parameters. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  9. 9
  10. 10

    Route Optimization System by Zulkifli, Abdul Hayy

    Published 2005
    “…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
    Get full text
    Get full text
    Final Year Project
  11. 11

    Smart Cards And The Fingerprint : A Proposed Framework For The Automatic Teller Machine (ATM) System by Mohd. Hasbullah, Omar

    Published 2002
    “…As a result, the research proposed a framework for user identification and authentication in automatic teller machine (ATM) systems using fingerprints and smart cards as opposed to the PIN and magnetic-stripe cards. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16

    Online fingerprint recognition by Khairul Bariyah, Abd Rahim

    Published 2010
    “…Fingerprints are the most popularly used in biometric identification and recognition systems, because they can be easily used and their features are highly reliable. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  17. 17

    The efficacy of deep learning algorithm in classifying chilli plant growth stages by Muammar Rozilan, Danial Mirza, Hanafi, Marsyita, Ali, Roslizah, Razak, Mohd Adib, Cui, Hairu

    Published 2021
    “…The demand in this field has created various opportunities, especially for automatic classification using deep learning methods. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18
  19. 19

    Design and Implementation of Data-at-Rest Encryption for Hadoop by Wan Nor Shuhadah, Wan Nik, Mohamad Afendee, Mohamed, Zarina, Mohamad, Siti Hanisah, Kamaruzaman

    Published 2017
    “…It is shown that the implementation of AES encryption algorithm is capable to secure data stored in HDFS to some extent.…”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Design and Implementation of Data-at-Rest Encryption for Hadoop by Wan Nor Shuhadah, Wan Nik, Mohamad Afendee, Mohamed, Zarina, Mohamad, Siti Hanisah, Kamaruzaman

    Published 2017
    “…It is shown that the implementation of AES encryption algorithm is capable to secure data stored in HDFS to some extent.…”
    Get full text
    Get full text
    Conference or Workshop Item