Search Results - (( subject identification using algorithm ) OR ( java application using algorithm ))
Search alternatives:
- subject identification »
- identification using »
- java application »
- using algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
-
3
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
4
Development of an effective clustering algorithm for older fallers
Published 2022“…The proposed fall risk clustering algorithm grouped the subjects according to features. …”
Get full text
Get full text
Article -
5
Data mining in mobile ECG based biometric identification
Published 2014“…This paper investigates the robustness of performing biometric identification in a mobile environment using electrocardiogram (ECG) signals. …”
Get full text
Get full text
Get full text
Article -
6
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
8
Real-time algorithmic music composition application.
Published 2022“…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
9
Hardware And Software Development Of ECG Biometric System
Published 2018“…In this project, Pan-Tompkins algorithm is used as feature extraction technique of ECG fiducial points while artificial neural network is used for identification system. …”
Get full text
Get full text
Monograph -
10
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
Get full text
Get full text
Conference or Workshop Item -
11
Automated system for concrete damage classification identification using various classification techniques in machine learning / Nur Haziqah Mat ... [et al.]
Published 2021“…This invention can recognize a certain damage while the classification of defects is classified according to the features extracted from the images by using GLCM algorithm. The performance of these algorithms is evaluated by dividing the dataset into two sections: testing and training. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
13
Language identification system using Matlab: design, implementation, and sample codes
Published 2017“…Vector Quantization (VQ) algorithm is then used as classifier. The recognition rate is then calculated for each language. …”
Get full text
Get full text
Book -
14
Application of genetic algorithm and JFugue in an evolutionary music generator
Published 2025“…This project explores the application of Genetic Algorithms (GA) with JFugue, which is a Java-based music programming library to develop an Evolutionary Music Generator. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
15
Thermal Imaging Analysis of Potentially Harmful Subject for Night Vision System
Published 2013“…Image processing is fully used to fulfill the identification of the subject. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Development of language identification system using MFCC and vector quantization
Published 2017“…Vector Quantization (VQ) algorithm is then used as classifier. The recognition rate is then calculated for each language. …”
Get full text
Get full text
Get full text
Proceeding Paper -
17
Realization Of The 1D Local Binary Pattern (LBP) Algorithm In Raspberry Pi For Iris Classification Using K-NN Classifier
Published 2018“…Firstly, the 1D-LBP algorithm is used to extract the features of the normalized iris images and save the data in a text file according to the subject and the combinations to evaluate for the next stage. …”
Get full text
Get full text
Monograph -
18
Evolutionary Programming (EP) based technique for secure point identification with load shedding technique in power transmission / Abdul Rahman Minhat
Published 2008“…Consequently, another algorithm for maximum loadability identification using EP optimization technique was also developed. …”
Get full text
Get full text
Thesis -
19
-
20
Route Optimization System
Published 2005“…The method used to develop this project is Rapid Application Development (RAD). …”
Get full text
Get full text
Final Year Project
