Search Results - (( using identification matching algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- identification matching »
- using identification »
- application mining »
- java application »
- mining algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Online fingerprint recognition
Published 2010“…For minutiae matching, the matching algorithm has been developed. …”
Get full text
Get full text
Undergraduates Project Papers -
4
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
5
Identification of power poles based on satellite stereo images using graph-cut algorithm
Published 2023Conference Paper -
6
Identification of power poles based on satellite stereo images using graph-cut algorithm
Published 2015“…In conclusion, based on the results, Our proposed Graph-Cut algorithm produces more accurate disparity maps than the existing matching algorithm used for disparity calculation.…”
Get full text
Get full text
Conference or Workshop Item -
7
Identification of power poles based on satellite stereo images using graph-cut algorithm
Published 2015“…In conclusion, based on the results, Our proposed Graph-Cut algorithm produces more accurate disparity maps than the existing matching algorithm used for disparity calculation. …”
Get full text
Get full text
Conference or Workshop Item -
8
PERSON IDENTIFICATION BASED ON MULTIMODAL BIOMETRIC RECOGNITION
Published 2020“…In the process of fingerprint recognition, the ORB algorithm is recommended to use in feature matching. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
9
Fingerprint recognition system
Published 2005“…Fingerprint recognition is the oldest method which has been used in numerous applications for identification purpose in many social conditions such as access control and crime investigation.Now a day,in the era of technology the system is still using the password or smart card as an identity character for identification purpose.The problems happen when user forgot their password or lost their smart card. …”
Get full text
Get full text
Undergraduates Project Papers -
10
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
12
Person identification in irregular cardiac conditions using electrocardiogram signals
Published 2011“…Cross correlation (CC) was used as the biometric matching algorithm with defined threshold values to evaluate the performance. …”
Get full text
Get full text
Get full text
Proceeding Paper -
13
An improved plant identification system by Fuzzy c-means bag of visual words model and sparse coding
Published 2020“…Performance of proposed methods surpass the classic bag of words algorithm for plant identification tasks.…”
Get full text
Get full text
Get full text
Article -
14
Plant identification using combination of fuzzy c-means spatial pyramid matching, gist, multi-texton histogram and multiview dictionary learning
Published 2016“…Plants identification has become a significant and incentive research area. …”
Get full text
Get full text
Thesis -
15
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
16
Development of efficient iris identification algorithm using wavelet packets for smartphone application
Published 2017“…Results showed that the accuracy of the proposed algorithm is 100% identification rate.…”
Get full text
Get full text
Get full text
Get full text
Article -
17
AR oriented pose matching mechanism from motion capture data
Published 2023“…In order to extract the exact matched pose, the frame sequence is divided into pose feature frame and skeletal data frame by the use of pose matching dance training movement recognition algorithm (PMDTMR). …”
Article -
18
DEVELOPMENT OF IRIS RECOGNITION SYSTEM
Published 2016“…This project implements an iris recognition algorithm as a biometric identification. There is a need for reliable and security identification since typical identification methods using identity cards, passwords, and user name possess threats to the security of an organization because of human error. …”
Get full text
Get full text
Final Year Project -
19
An efficient method of biometric matching using interpolated ECG data
Published 2010“…In this paper, a person identification method using electrocardiogram (ECG) is presented based on cubic spline interpolation method. …”
Get full text
Get full text
Get full text
Proceeding Paper -
20
Efficient tag grouping RFID anti-collision algorithm for internet of things applications based on improved k-means clustering
Published 2023“…In the initialization stage, the reader uses improved K-means clustering running concurrently with a tag counter algorithm to cluster tags into K groups using tags RN16 while the counter returns an accurate tag number estimate. …”
Get full text
Get full text
Article
