Search Results - (( using vectorization matching algorithm ) OR ( java implementation using algorithm ))

Refine Results
  1. 1

    Block based motion vector estimation using fuhs16 uhds16 and uhds8 algorithms for video sequence by S. S. S. , Ranjit

    Published 2011
    “…In addition, the mentioned block-matching algorithms are the baseline techniques that have been used to further develop all the enhanced or improved algorithms. …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  2. 2

    Partial fingerprint recognition using support vector machine by Vijayaprasad, Perumal, Sulaiman, Md. Nasir, Mustapha, Norwati, O. K. Rahmat, Rahmita Wirza

    Published 2010
    “…Global minutiae-based matching algorithm is used to record the matching pairs and their feature vectors are used to generate a model file which is used for classification. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  4. 4

    Improving sentiment reviews classification performance using support vector machine-fuzzy matching algorithm by Nurcahyawati, Vivine, Mustaffa, Zuriani

    Published 2023
    “…This study uses a new approach based on the combination of three powerful techniques which are: tokenizing-lowercasing-stemming (for series of preprocessing), support vector machine (SVM) for supervised classification, and fuzzy matching (FM) for dimensionality reduction. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Provider independent cryptographic tools by Ibrahim, Subariah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
    Get full text
    Get full text
    Get full text
    Monograph
  6. 6

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    A Hybrid Rough Sets K-Means Vector Quantization Model For Neural Networks Based Arabic Speech Recognition by Babiker, Elsadig Ahmed Mohamed

    Published 2002
    “…A vector quantization model that incorporate rough sets attribute reduction and rules generation with a modified version of the K-means clustering algorithm was developed, implemented and tested as a part of a speech recognition framework, in which the Learning Vector Quantization (LVQ) neural network model was used in the pattern matching stage. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Performance evaluation of real-time multiprocessor scheduling algorithms by Alhussian, H., Zakaria, N., Abdulkadir, S.J., Fageeri, S.O.

    Published 2016
    “…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Automatic Number Plate Recognition on android platform: With some Java code excerpts by ., Abdul Mutholib, Gunawan, Teddy Surya, Kartiwi, Mira

    Published 2016
    “…On the other hand, the traditional algorithm using template matching only obtained 83.65% recognition rate with 0.97 second processing time. …”
    Get full text
    Get full text
    Get full text
    Book
  12. 12

    Human computer interaction using isolated-words speech recognition technology by Abu Shariah, Mohammad Abd-Alrahman Mahmoud, Ainon, Raja Noor, Zainuddin, Roziati, Khalifa, Othman Omran

    Published 2007
    “…To extract features from speech signals, Mel-Frequency Cepstral Coefficients (MFCC) algorithm was applied. Subsequently, Vector Quantization was used for all feature vectors generated from the MFCC. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  13. 13

    Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework by Asaad Aref, Ibrahim

    Published 2004
    “…Java Media Framework library and the RTP protocol for audio transmission were used as development tools.The developed system designed in this thesis together with experimental results proved that the system could be implemented successfully. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Investigation of block matching algorithm for video coding by Faizul Hadi Mohamad Jamil

    Published 2013
    “…The temporal model deals with motion estimation (ME) and motion compensation (MC) algorithm with the matching technique called “Block Matching Algorithm” (BMA) to produce the next encoded video frame with motion vector. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Heuristic optimization-based wave kernel descriptor for deformable 3D shape matching and retrieval by Naffouti, S.E., Fougerolle, Y., Aouissaoui, I., Sakly, A., Mériaudeau, F.

    Published 2018
    “…This paper presents an optimized wave kernel signature (OWKS) using a modified particle swarm optimization (MPSO) algorithm. …”
    Get full text
    Get full text
    Article
  16. 16

    Heuristic optimization-based wave kernel descriptor for deformable 3D shape matching and retrieval by Naffouti, S.E., Fougerolle, Y., Aouissaoui, I., Sakly, A., Mériaudeau, F.

    Published 2018
    “…This paper presents an optimized wave kernel signature (OWKS) using a modified particle swarm optimization (MPSO) algorithm. …”
    Get full text
    Get full text
    Article
  17. 17

    Signature verification system using support vector machine by Fauziyah, Salehuddin, Azlina , Othman

    Published 2009
    “…The general on-line verification procedures are preprocessing, features extraction, detail matching and post processing. The common verification algorithm is one of the Global Feature Vector Machine called Support Vector Machine (SVM). …”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Enhancement and assessment of WKS variance parameter for intelligent 3D shape recognition and matching based on MPSO by Naffouti, S.E., Aouissaoui, I., Fougerolle, Y., Sakly, A., Meriaudeau, F.

    Published 2017
    “…This paper presents an improved wave kernel signature (WKS) using the modified particle swarm optimization (MPSO)-based intelligent recognition and matching on 3D shapes. …”
    Get full text
    Get full text
    Article
  19. 19

    Indoor positioning using weighted magnetic field signal distance similarity measure and fuzzy based algorithms by Bundak, Caceja Elyca

    Published 2021
    “…A matching algorithm is used to match between the top 10 ranked RPs with the nearest Euclidean distance to the TP with the RPs clustered. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Café Web Based System Using Priority Scheduling Approach by Fatimah, Ghazali, Rohana, Ismail, Mohamad Hariz, Hasni

    Published 2017
    “…The system is implemented at UniSZA’s café where two different types of user will use the system. …”
    Get full text
    Get full text
    Conference or Workshop Item