Search Results - (( pattern extraction path algorithm ) OR ( java data normalization algorithm ))
Search alternatives:
- normalization algorithm »
- pattern extraction »
- data normalization »
- extraction path »
- path algorithm »
- java »
-
1
Feature extraction: hand shape, hand position and hand trajectory path
Published 2011Get full text
Get full text
Get full text
Book Chapter -
2
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…Even a normal people using clustering to grouping their data. …”
Get full text
Get full text
Thesis -
3
Animal voice recognition for identification (ID) detection system
Published 2011“…While the voice pattern classification will be done by using DTW algorithm. …”
Get full text
Get full text
Conference or Workshop Item -
4
Dog voice identification (ID) for detection system
Published 2012“…While the voice pattern classification will be done by using DTW algorithm. …”
Get full text
Get full text
Conference or Workshop Item -
5
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
6
NN with DTW-FF Coefficients and Pitch Feature for Speaker Recognition
Published 2006“…This paper proposes a new method to extract speech features in a warping path using dynamic programming (DP). …”
Get full text
Get full text
Article -
7
Local DTW coefficients and pitch feature for back-propagation NN digits recognition
Published 2006“…This paper presents a method to extract existing speech features in dynamic time warping path which originally was derived from LPC. …”
Get full text
Conference or Workshop Item -
8
Local DTW Coefficients and Pitch Feature for Back-Propagation NN Digits Recognition
Published 2006“…This paper presents a method to extract existing speech features in dynamic time warping path which originally was derived from LPC. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Electing the best set of features will help to improve the classifier predictions in terms of the normal and abnormal pattern. The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
Get full text
Get full text
Thesis -
10
Advances in materials informatics: A review
Published 2024“…Conventional ML models are simple and interpretable, relying on statistical techniques and algorithms to learn patterns and make predictions with limited data. …”
Get full text
Get full text
Get full text
Article -
11
Challenges of hidden data in the unused area two within executable files
Published 2009“…The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
Get full text
Get full text
Get full text
Article -
12
A hybrid environment control system combining EMG and SSVEP signal based on brain-computer interface technology
Published 2021“…The feature in terms of the common spatial pattern (CSP) has been extracted from four classes of SSVEP response, and extracted feature has been classified using K-nearest neighbors (k-NN) based classification algorithm. …”
Get full text
Get full text
Get full text
Article -
13
Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions
Published 2017“…Two sets of experimental data involving 20 diabetic patients and 20 healthy subjects were collected from CITO laboratory Semarang Central Java, Indonesia. …”
Get full text
Get full text
Get full text
Get full text
Thesis
