Search Results - (( pattern identification using algorithm ) OR ( java application using algorithm ))
Search alternatives:
- pattern identification »
- identification using »
- java application »
- using algorithm »
-
1
Linear-PSO with binary search algorithm for DNA Motif Discovery / Hazaruddin Harun
Published 2015“…At present, DNA sequencing analysis is the most utilised technique for species identification where patterns of DNA sequences are determined by comparing the sequence to comprehensive databases. …”
Get full text
Get full text
Book Section -
2
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
3
Animal voice recognition for identification (ID) detection system
Published 2011“…While the voice pattern classification will be done by using DTW algorithm. …”
Get full text
Get full text
Conference or Workshop Item -
4
Dog voice identification (ID) for detection system
Published 2012“…While the voice pattern classification will be done by using DTW algorithm. …”
Get full text
Get full text
Conference or Workshop Item -
5
Acoustic echo cancellation using adaptive filtering algorithms for quranic accents (Qiraat) identification
Published 2015“…Based on our experimental results, the AP algorithm achieved 93.9 % accuracy rate against all pattern classification techniques including PPCA, KNN, and GMM. …”
Get full text
Get full text
Get full text
Article -
6
The Effect Of Linkages In The Hierarchical Clustering Of Auto-Regressive Algorithm For Defect Identification In Heat Exchanger Tubes
Published 2019“…The pattern recognition approach using ‘ward’ linkages in AR algorithm has been shown to effectively identify the defects in the heat exchanger tubes.…”
Get full text
Get full text
Get full text
Article -
7
Linear-pso with binary search algorithm for DNA motif discovery / Hazaruddin Harun
Published 2015“…Another five species were used for Motif Identification, which were human, sheep, dog, frog, and rat. …”
Get full text
Get full text
Thesis -
8
High impedance fault detection and identification based on pattern recognition of phase displacement computation
Published 2018“…There are two stages in this algorithm. In the first stage, the pattern of the PDC is analyzed to detect the occurrence of an event. …”
Get full text
Get full text
Article -
9
-
10
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
11
Design of intelligent Qira’at identification algorithm
Published 2017“…To evaluate the algorithm, 350 samples for 10 types of Qira’at recitation are in used, and for justifying the best pattern classification, few algorithms are tested in the early preliminary evaluation with K-Nearest Neighbour, GMM and PPCA. …”
Get full text
Get full text
Thesis -
12
MINING CUSTOMER DATA FOR DECISION MAKING USING NEW HYBRID CLASSIFICATION ALGORITHM
Published 2011“…The experimental result shows that the proposed hybrid k-mean plus MFP algorithm can generate more useful pattern from large stock data.…”
Get full text
Get full text
Citation Index Journal -
13
EEG EYE STATE IDENTIFICATION BASED ON STATISTICAL FEATURES AND COMMON SPATIAL PATTERN
Published 2019“…Hence, the proposed work aimed to analyse the EEG eye state signal as well as develop an algorithm using statistical-CSP features on the eye state identification.…”
Get full text
Get full text
Final Year Project -
14
MINING CUSTOMER DATA FOR DECISION MAKING USING NEW HYBRID CLASSIFICATION ALGORITHM
Published 2011“…The experimental result shows that the proposed hybrid k-mean plus MFP algorithm can generate more useful pattern from large stock data.…”
Get full text
Get full text
Citation Index Journal -
15
Frequent patterns minning of stock data using hybrid clustering association algorithm
Published 2009“…The experimental result shows that the proposed hybrid k-mean plus MFP algorithm can generate more useful pattern from large stock data. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Investigating optimal smartphone placement for identifying stairs movement using machine learning
Published 2023“…Successful identification of stair movement activity by using a smartphone can significantly contribute to future research and could also prove useful to the wider community such as amputees and those with pathological gait. …”
Get full text
Get full text
Get full text
Get full text
Article -
17
Register Transfer Level Implementation Of Pooling - Based Feature Extraction For Finger Vein Identification
Published 2017“…The proposed algorithm extracted the local feature information of the finger vein pattern (patches), and used these patches to improve the robustness of the identification. …”
Get full text
Get full text
Thesis -
18
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
20
Personal identification by Keystroke Pattern for login security
Published 2001Get full text
Get full text
Thesis
