Search Results - (( write identification using algorithm ) OR ( java implementation means algorithm ))
Search alternatives:
- write identification »
- identification using »
- implementation means »
- java implementation »
- using algorithm »
- means algorithm »
-
1
A web-based implementation of k-means algorithms
Published 2022“…The K-means algorithm has been around for over a century. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
2
Relevance detection and summarizing strategies identification algorithm using linguistic measures / Seyed Asadollah Abdiesfandani
Published 2016“…The algorithm simulates two important tasks that are frequently used by the human experts to identify summarizing strategies used to produce the summary sentences: 1) sentences relevance identification; and 2) summarizing strategies identification. …”
Get full text
Get full text
Thesis -
3
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…This study aims to compare the performance of Boyer-Moore, Knuth morris pratt, and Horspool algorithms in searching for the meaning of words in the Java-Indonesian dictionary search application in terms of accuracy and processing time. …”
Get full text
Get full text
Journal -
4
-
5
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
6
Biometrics electronic purse
Published 1999“…This paper looked into using biometrics as a mean of authentication, thus requiring a new generation of Smart Card technology to be implemented in banking and multiple applications environment. …”
Get full text
Get full text
Get full text
Proceeding Paper -
7
Movie recommendation system / Najwa Syamimie Hasnu
Published 2020“…PHPMyAdmin is used to store the dataset and also acts as a database for user information. The algorithm chosen was implemented using Java Programming language and was tested using Root Means Square Error (RMSE) formula.…”
Get full text
Get full text
Thesis -
8
-
9
Image clustering comparison of two color segmentation techniques
Published 2010“…This project proposed a two color segmentation techniques such as K-means and Fuzzy C-means clustering algorithm that are accurately segment the desired images, which have the same color as the pre-selected pixels with background subtraction. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
A New Swarm-Based Framework for Handwritten Authorship Identification in Forensic Document Analysis
Published 2014“…Its principal point is in forensics and biometric application as such the writing style can be used as bio-metric features for authenticating the identity of a writer. …”
Get full text
Get full text
Book Chapter -
11
A new swarm-based framework for handwritten authorship identification in forensic document analysis
Published 2014“…Its principal point is in forensics and biometric application as such the writing style can be used as bio-metric features for authenticating the identity of a writer. …”
Get full text
Get full text
Book Chapter -
12
Author identification for under-resourced language Kadazandusun
Published 2020“…Stylometric features are used to quantify the writing styles of the authors which includes character n-grams and word n-grams. …”
Get full text
Get full text
Get full text
Get full text
Article -
13
Study on crack detection using image processing techniques and deep learning – a survey
Published 2020“…The purpose of this writing is to study and understand the existing crack detection techniques using image processing. …”
Get full text
Get full text
Article -
14
Invariants discretization for individuality representation in handwritten authorship
Published 2008“…Its focal point is in forensics and biometric application as such the writing style can be used as biometric features for authenticating a writer. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
-
16
Data Hiding Techniques In Digital Images
Published 2003“…After all these studies, one of the algorithms in the masking technique is developed and implemented using JAVA program to embed message into true color image with a good quality and higher capacity. …”
Get full text
Get full text
Thesis -
17
Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform
Published 2009“…The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
-
19
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The proposed protocol using 64 bits index is proved having the lowest non-unequivocally identification probability. …”
Get full text
Get full text
Thesis -
20
Human activity recognition via accelerometer and gyro sensors
Published 2023“…This project aims to address the issue of inefficient data engineering infrastructure being used in current HAR research by developing an efficient, comprehensive, and user-friendly data engineering system for data collection, annotation, and storage. To implement the data engineering system proposed, two mobile applications, SensorData and SensorDataLogger with user-friendly interfaces and intuitive functionalities are developed using Java programming language and Android Studio. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis
