Search Results - (( write identification using algorithm ) OR ( java implementation tree algorithm ))
Search alternatives:
- write identification »
- identification using »
- java implementation »
- implementation tree »
- using algorithm »
- tree algorithm »
-
1
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
2
Relevance detection and summarizing strategies identification algorithm using linguistic measures / Seyed Asadollah Abdiesfandani
Published 2016“…The algorithm simulates two important tasks that are frequently used by the human experts to identify summarizing strategies used to produce the summary sentences: 1) sentences relevance identification; and 2) summarizing strategies identification. …”
Get full text
Get full text
Thesis -
3
-
4
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
Get full text
Get full text
Get full text
Thesis -
5
-
6
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…This study proposes a car parking management system which applies Dijkstra’s algorithm, Ant Colony Optimization (ACO) and Binary Search Tree (BST) in structuring a guidance system for indoor parking. …”
Get full text
Get full text
Thesis -
7
A New Swarm-Based Framework for Handwritten Authorship Identification in Forensic Document Analysis
Published 2014“…Its principal point is in forensics and biometric application as such the writing style can be used as bio-metric features for authenticating the identity of a writer. …”
Get full text
Get full text
Book Chapter -
8
A new swarm-based framework for handwritten authorship identification in forensic document analysis
Published 2014“…Its principal point is in forensics and biometric application as such the writing style can be used as bio-metric features for authenticating the identity of a writer. …”
Get full text
Get full text
Book Chapter -
9
Author identification for under-resourced language Kadazandusun
Published 2020“…Stylometric features are used to quantify the writing styles of the authors which includes character n-grams and word n-grams. …”
Get full text
Get full text
Get full text
Get full text
Article -
10
Study on crack detection using image processing techniques and deep learning – a survey
Published 2020“…The purpose of this writing is to study and understand the existing crack detection techniques using image processing. …”
Get full text
Get full text
Article -
11
Invariants discretization for individuality representation in handwritten authorship
Published 2008“…Its focal point is in forensics and biometric application as such the writing style can be used as biometric features for authenticating a writer. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
-
13
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The proposed protocol using 64 bits index is proved having the lowest non-unequivocally identification probability. …”
Get full text
Get full text
Thesis -
14
Problem Solving
Published 2010“…Additionally in solving ill-structured problems, people may need to use more than a heuristic or an algorithmic strategy; insight may be required. …”
Get full text
Get full text
Article
