Search Results - (( java implication based algorithm ) OR ( writer classification technique algorithm ))
Search alternatives:
- classification technique »
- writer classification »
- implication based »
- java implication »
-
1
Discretization of integrated moment invariants for writer identification
Published 2008“…Successive exploration is executed to investigate for the suitability of discretization techniques in probing the issues of writer authorship. …”
Get full text
Get full text
Conference or Workshop Item -
2
A New Swarm-Based Framework for Handwritten Authorship Identification in Forensic Document Analysis
Published 2014“…Therefore, feature extraction and selection of the unique individual significant features are very important in order to identify the writer, moreover to improve the classification accuracy. …”
Get full text
Get full text
Book Chapter -
3
A new swarm-based framework for handwritten authorship identification in forensic document analysis
Published 2014“…Therefore, feature extraction and selection of the unique individual significant features are very important in order to identify the writer, moreover to improve the classification accuracy. …”
Get full text
Get full text
Book Chapter -
4
Arabic Calligraphy Classification using Triangle Model for Digital Jawi Paleography Analysis
Published 2011“…Calligraphy classification of the ancient manuscripts gives useful information to paleographers. …”
Get full text
Get full text
Conference or Workshop Item -
5
Arabic Calligraphy Classification using Triangle Model for Digital Jawi Paleography Analysis
Published 2011“…Calligraphy classification of the ancient manuscripts gives useful information to paleographers. …”
Get full text
Get full text
Conference or Workshop Item -
6
Features Extraction of Arabic Calligraphy using extended Triangle Model for Digital Jawi Paleography Analysis
Published 2013“…The information helps paleographer to identify date, writer, number of writers, place of origin, and the originality of manuscripts. …”
Get full text
Get full text
Article -
7
Android: S-Based Technique in Mobile Malware Detection
Published 2018“…It causes files to be corrupted and secret information being compromised. Nowadays malware writers try to avoid detection from malware detectors using several techniques such as polymorphism and metamorphism. …”
Get full text
Get full text
Get full text
Article -
8
Invariants discretization for individuality representation in handwritten authorship
Published 2008“…Writer identification is one of the areas in pattern recognition that have created a center of attention by many researchers to work in. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
-
10
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis
