Search Results - (( write identification using algorithm ) OR ( java application customization algorithm ))
Search alternatives:
- customization algorithm »
- write identification »
- identification using »
- java application »
- using algorithm »
-
1
Relevance detection and summarizing strategies identification algorithm using linguistic measures / Seyed Asadollah Abdiesfandani
Published 2016“…The algorithm simulates two important tasks that are frequently used by the human experts to identify summarizing strategies used to produce the summary sentences: 1) sentences relevance identification; and 2) summarizing strategies identification. …”
Get full text
Get full text
Thesis -
2
-
3
-
4
A New Swarm-Based Framework for Handwritten Authorship Identification in Forensic Document Analysis
Published 2014“…Its principal point is in forensics and biometric application as such the writing style can be used as bio-metric features for authenticating the identity of a writer. …”
Get full text
Get full text
Book Chapter -
5
A new swarm-based framework for handwritten authorship identification in forensic document analysis
Published 2014“…Its principal point is in forensics and biometric application as such the writing style can be used as bio-metric features for authenticating the identity of a writer. …”
Get full text
Get full text
Book Chapter -
6
Author identification for under-resourced language Kadazandusun
Published 2020“…Stylometric features are used to quantify the writing styles of the authors which includes character n-grams and word n-grams. …”
Get full text
Get full text
Get full text
Get full text
Article -
7
Study on crack detection using image processing techniques and deep learning – a survey
Published 2020“…The purpose of this writing is to study and understand the existing crack detection techniques using image processing. …”
Get full text
Get full text
Article -
8
Invariants discretization for individuality representation in handwritten authorship
Published 2008“…Its focal point is in forensics and biometric application as such the writing style can be used as biometric features for authenticating a writer. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
-
10
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
11
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The proposed protocol using 64 bits index is proved having the lowest non-unequivocally identification probability. …”
Get full text
Get full text
Thesis -
12
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
Problem Solving
Published 2010“…Additionally in solving ill-structured problems, people may need to use more than a heuristic or an algorithmic strategy; insight may be required. …”
Get full text
Get full text
Article
