Search Results - (( java segmentation using algorithm ) OR ( basic verification _ algorithm ))
Search alternatives:
- basic verification »
- java segmentation »
- using algorithm »
-
1
Image clustering comparison of two color segmentation techniques
Published 2010“…Finally, the algorithm found, which would solve the image segmentation problem.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
Automatic Number Plate Recognition on android platform: With some Java code excerpts
Published 2016“…On the other hand, the traditional algorithm using template matching only obtained 83.65% recognition rate with 0.97 second processing time. …”
Get full text
Get full text
Get full text
Book -
3
Development of seven segment display recognition using TensorFlow on Raspberry Pi
Published 2022Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
4
Finger vein verification system using repeated line tracking and dimensionality reduction using PCA algorithms with SURF matching
Published 2017“…The result shows that PCA can improve the accuracy of the verification system by reduce the data down into its basic component without much loss of the information…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
-
6
CSC510: Discrete Structures / College of Computing, Informatics and Media
Published 2022“…This course discusses the basic tools of mathematics and logic to provide the logical foundation underlying the design and analysis of algorithms for problems solving in computer science. …”
Get full text
Get full text
Get full text
Teaching Resource -
7
Speech emotion verification system (SEVS) based on MFCC for real time applications
Published 2008Get full text
Get full text
Get full text
Proceeding Paper -
8
A hardware implementation of Rivest-Shamir-Adleman co-processor for resource constrained embedded systems
Published 2006“…The designed RSA coprocessor core is actually a modular exponentiation hardware engine, which is the basic arithmetic operation in implementing a RSA public key encryption and decryption algorithm. …”
Get full text
Get full text
Thesis -
9
Human Spontaneous Emotion Detection System
Published 2018“…Having smart computerized system which can understand and instantly gives appropriate response to human is the utmost motive in human and computer interaction (HCI) field.It is argued either HCI is considered advance if human could not have natural and comfortable interaction like human to human interaction.Besides,despite of several studies regarding emotion detection system, current system mostly tested in laboratory environment and using mimic emotion.Realizing the current system research lack of real life or genuine emotion input,this research work comes up with the idea of developing a system that able to recognize human emotion through facial expression.Therefore,the aims of this study are threefold which are to enhance the algorithm to detect spontaneous emotion,to develop spontaneous facial expression database and to verify the algorithm performance.This project used Matlab programming language,specifically Viola Jones method for features tracking and extraction,then pattern matching for emotion classification purpose.Mouth feature is used as main features to identify the emotion of the expression.For verification purpose,the mimic and spontaneous database which are obtained from internet,open source database or novel (own) developed databases are used.Basically,the performance of the system is indicated by emotion detection rate and average execution time.At the end of this study,it is found that this system is suitable for recognizing spontaneous facial expression (63.28%) compared to posed facial expression (51.46%).The verification even better for positive emotion with 71.02% detection rate compared to 48.09% for negative emotion detection rate.Finally,overall detection rate of 61.20% is considered good since this system can execute result within 3s and use spontaneous input data which known as highly susceptible to noise.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
Bundle Sorting Mobile Application
Published 2020“…It also helps the verification of the number of garments in every department in the production line. …”
Get full text
Get full text
Final Year Project -
11
AUTO-MANAGE PARKING SYSTEM (AMPS)
Published 2019“…For functionality, the system only able to serve its basic function and it still need few improvements. …”
Get full text
Get full text
Final Year Project -
12
Raspberry Pi-Based Finger Vein Recognition System Using PCANet
Published 2018“…For classification, k-Nearest Neighbours (kNN) with Euclidean distance algorithm is implemented. An enhancement version for kNN algorithm, k-General Nearest Neighbours (kGNN) have been proposed at initial stage. …”
Get full text
Get full text
Monograph -
13
Comparison of Landsat 8, Sentinel-2 and spectral indices combinations for Google Earth Engine-based land use mapping in the Johor River Basin, Malaysia
Published 2021“…The Random Forest (RF) algorithm was used to classify the land use land cover (LULC) with 222 training samples and 78 verification samples obtained through the Google Earth Pro higher resolution satellite images and field samplings. …”
Get full text
Get full text
Get full text
Article -
14
Bottleneck-based heuristic for permutation flowshop scheduling
Published 2017“…The heuristic evaluation result showed that the BNB heuristic is performing better than the NEH at bottleneck machines M1, M3 and M4. While, heuristic verification result showed that the bottleneck algorithms performed the best in minimizing the makespan for set of problems with bottleneck machine M4. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
15
A PLC-based Hybrid Fuzzy PID Controller for PWM-driven Variable Speed Drive
Published 2010“…A simulation model in MA TLAB/Simulink is developed using system identification technique to perform verification of the PLCbased intelligent controller of the PWM-driven VVVF algorithm. …”
Get full text
Get full text
Thesis -
16
Development and Application of a Finite Element Distributed Rainfall Runoff Simulation Model
Published 2000“…The system of nonlinear equations was solved using successive substitutions employing Thomas algorithm and Gaussian elimination. The whole formulation was set up using the MapBasic and Map Info Geographical Information System. …”
Get full text
Get full text
Thesis -
17
Digital forensic investigation reduction model (DIFReM) for Windows 10 OS
Published 2018“…“digital data that may be of evidential value” for use in court. The six basic steps defined by Digital Forensics Research Workshop (DFRWS) and generally followed in the forensic investigation are Identification, Preservation, Collection, Examination, Analysis and Presentation. …”
Get full text
Get full text
Thesis
