Search Results - (( recognition application using algorithm ) OR ( java application stemming algorithm ))

Refine Results
  1. 1

    Letter recognition using backpropagation algorithm by Azrul Hafiz, Awang

    Published 2010
    “…Letter Recognition using Backpropagation Algorithm is an application to analyze the letter data and the performance of Backpropagation Neural Network in letter recognition. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  2. 2
  3. 3
  4. 4
  5. 5

    Utilisation of Exponential-Based Resource Allocation and Competition in Artificial Immune Recognition System by Hormozi, Shahram Golzari

    Published 2011
    “…Artificial Immune Recognition System is one of the several immune inspired algorithms that can be used to perform classification, a data mining task. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Face recognition using PZMI, ANN and Ant colony algorithms / Milad Miri by Milad , Miri

    Published 2018
    “…Algorithms developed for face recognition are tightly related to the rate of extracted face features. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Algorithm of face recognition by principal component analysis by Al-Khateeb, Khalid A. Saeed, Yeop Johari, Jaiz Anuar

    Published 2002
    “…A face recognition algorithm based on Principal Component Analysis (PCA) has been developed and tested for computer vision applications. …”
    Get full text
    Get full text
    Article
  8. 8
  9. 9

    Quranic diacritic and character segmentation and recognition using flood fill and k-nearest neighbors algorithm by Alotaibi, Faiz E A L

    Published 2019
    “…A distinctive type of OCR is used to process Arabic characters, namely, Arabic Optical Character Recognition (AOCR). …”
    Get full text
    Get full text
    Thesis
  10. 10

    Feature extraction using active appearance model algorithm with Bayesian classification approach by Nuruzzaman, Mohammad, Hussain, Azham, Mohamad Tahir, Hatim, Abu Seman, Mohamad Amir

    Published 2013
    “…This paper addressed some of these issues to bring face recognition more closely to being useful for real-life applications. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11
  12. 12

    The fusion of edge detection and mathematical morphology algorithm for shape boundary recognition by Othman, Mahmod, Syed Abdullah, Sharifah Lailee, Ahmad, Khairul Adilah, Abu Bakar, Mohd Nazari, Mansor, Ab Razak

    Published 2016
    “…Edge detection algorithm is used to simplify image data by minimizing the amount of pixel to be processed, whereas the mathematical morphology is used for smoothing effects and localizing the object shape using mathematical theory sets.The discussion section focuses on the improved edge map and boundary morphology (EmaBm) algorithm as a new technique for shape boundary recognition.A comparative analysis of various edge detection algorithms is presented.It reveals that the LoG’s edge detection embedded in EmaBM algorithm performs better than the other edge detection algorithms for fruit shape boundary recognition. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13
  14. 14

    Animal voice recognition for identification (ID) detection system by Yeo, Che Yong, Syed Mohamed, Syed Abdul Rahman Al-Haddad, Ng, Chee Kyun

    Published 2011
    “…Voice recognition systems have become the important applications for speech recognition technology. …”
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15
  16. 16

    Dynamic Bayesian Networks and Variable Length Genetic Algorithm for Dialogue Act Recognition by Ali Yahya, Anwar

    Published 2007
    “…The results confirm the merits of using dynamic Bayesian networks for dialogue act recognition. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Modified least trimmed squares method for face recognition / Nur Azimah Abdul Rahim by Abdul Rahim, Nur Azimah

    Published 2018
    “…For most face recognition algorithms, partial occlusions affect the performance of the algorithm. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Online fingerprint recognition by Khairul Bariyah, Abd Rahim

    Published 2010
    “…Fingerprints are the most popularly used in biometric identification and recognition systems, because they can be easily used and their features are highly reliable. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  19. 19
  20. 20