Search Results - (( pattern detection matching algorithm ) OR ( java application based algorithm ))

Refine Results
  1. 1
  2. 2

    A new split based searching for exact pattern matching for natural texts by Hakak, Saqib Iqbal, Kamsin, Amirrudin, Shivakumara, Palaiahnakote, Idris, Mohd Yamani Idna, Gilkar, Gulshan Amin

    Published 2018
    “…Exact pattern matching algorithms are popular and used widely in several applications, such as molecular biology, text processing, image processing, web search engines, network intrusion detection systems and operating systems. …”
    Get full text
    Get full text
    Article
  3. 3
  4. 4

    THE INVESTIGATION ON ARABIC WORD POSE ESTIMATION ALGORITHM AS MARKER FOR AUGMENTED REALITY APPLICATION by Mohd Zailani, Syarah Munirah, Morshidi, Malik Arman

    Published 2018
    “…Based on results obtained for the pattern matching technique performance on Arabic scripts, SURF shows a better accuracy rate and execution time compared to another algorithm. …”
    Get full text
    Get full text
    Monograph
  5. 5

    Development Of Stereo-Matching Algorithm Based On Adaptive Weighted Prediction by Abd Razak, Siti Safwana

    Published 2019
    “…The experimental result on the proposed algorithm is able to reduce 17.4% of weighted average error for all and 9.62% of weighted average error for nonocc (nonoccluded) compared to others Stereo Matching Algorithm without the proposed framework. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Disparity Refinement Based on Depth Image Layers Separation for Stereo Matching Algorithms by Abd Manap, Nurulfajar, Soraghan, John J.

    Published 2012
    “…This paper presents a method to improve the raw disparity maps in the disparity refinement stage for stereo matching algorithm. The proposed algorithm will use the disparity depth map from the stereo matching algorithm as initial disparity depth output with a basic similarity metric of SAD. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Segmentation of Malay syllables in connected digit speech using statistical approach by Salam, M.S., Mohamad, Dzulkifli, Saleh, S.H.

    Published 2008
    “…Experiments were conducted to see the effect of number of the auto regressive model order p and sliding window length L in Brandt’s algorithm and Divergence algorithm in giving better match of the segmentation points. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Feature Extraction and Matching from images / lntan Syaherra Ramli by Ramli, lntan Syaherra

    Published 2023
    “…This is a fundamental task for many applications such as 30 point cloud reconstruction and pattern recognition. In this task, feature extraction is used to detect the unique feature point from the images. …”
    Get full text
    Get full text
    Monograph
  9. 9

    Region duplication forgery detection technique based on keypoint matching / Diaa Mohammed Hassan Uliyan by Diaa , Mohammed Hassan Uliyan

    Published 2016
    “…The proposed method used Hessian to detect the keypoints and their corresponding features are represented by robust descriptor known as Center symmetric local binary pattern (CSLBP). …”
    Get full text
    Get full text
    Thesis
  10. 10

    Investigation of block matching algorithm for video coding by Faizul Hadi Mohamad Jamil

    Published 2013
    “…The temporal model deals with motion estimation (ME) and motion compensation (MC) algorithm with the matching technique called “Block Matching Algorithm” (BMA) to produce the next encoded video frame with motion vector. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Hereditary ratio of adolescent to parent based on lips analysis using canny edge detection / Nor Shamimi Kharuddin by Kharuddin, Nor Shamimi

    Published 2010
    “…The main idea of this research is to get the lips features from facial images before proceed to the next process which is pattern matching. In this research, technique selection is done by doing some literature review to find the best one and also studying about the algorithm of each technique has. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Deviation detection in text using conceptual graph interchange format and error tolerance dissimilarity function by Kamaruddin, Siti Sakira, Hamdan, Abdul Razak, Abu Bakar, Azuraliza, Mat Nor, Fauzias

    Published 2012
    “…This paper focuses on a graph-based approach for text representation and presents a novel error tolerance dissimilarity algorithm for deviation detection. We resolve two non-trivial problems, i.e. semantic representation of text and the complexity of graph matching. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13
  14. 14

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  15. 15

    A framework for multiple moving objects detection in aerial videos by Kalantar, Bahareh, Abdul Halin, Alfian, Al-Najjar, Husam Abdulrasool H., Mansor, Shattri, Genderen, John L. Van, M. Shafri, Helmi Zulhaidi, Zand, Mohsen

    Published 2019
    “…Comparison is also done with three existing detection algorithms where experiments show promising results with precision at 94%, and recall at 89%.…”
    Get full text
    Get full text
    Get full text
    Book Section
  16. 16

    Pengesanan minutiae imej cap jari berskala kelabu menggunakan algoritma susuran batas by Sulong, Siti Masrina

    Published 2002
    “…Even though, Wse minutiae still detected during the process. Based on these errors, an improved Ridge Line Following Algorithm has developed which consist of five processes; tangent direction computation, sectioning and maximum determination, end point detection, bifurcation point detection, and post-processing. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    Mobile Malware Classification via System Calls and Permission for GPS Exploitation by Madihah Mohd Saudi, Husainiamer, MAB

    Published 2024
    “…As a result, 21 out of 500 matched with these 32 patterns. These new patterns can be used as guidance for all researchers in the same field in identifying mobile malwares and can be used as the input for a formation of a new mobile malware detection model.…”
    Article
  19. 19

    Android: S-Based Technique in Mobile Malware Detection by Rahiwan Nazar, Romli, Mohamad Fadli, Zolkipli, Ali, Al Fahim Mubarak, Muhammed Ramiza, Ramli

    Published 2018
    “…In order to overcome malware, concern in mobile, we propose a new framework for malware detection which is signature based technique using pattern matching. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Scalability and performance in duplicate detection : relational vs. graph database by Muhammad Farhad, Khaharruddin

    Published 2023
    “…However, Neo4J excels in exact duplicate and near-duplicate detection algorithms, showcasing its strength in handling complex, interconnected data structures. …”
    Get full text
    Get full text
    Undergraduates Project Papers