Search Results - (( copy detection system algorithm ) OR ( panel classification using algorithm ))

  • Showing 1 - 18 results of 18
Refine Results
  1. 1

    Depth frame loss concealment for wireless transmission utilising motion detection information by Ranjbari, Mohamadreza

    Published 2014
    “…The methods are able to facilitate a frame copy algorithm and a high correlation of colour and depth frames to conceal depth frame loss. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Image authentication using Scale Invariant Feature Transform (SIFT) / Nurul Anis Suriana Adnan by Adnan, Nurul Anis Suriana

    Published 2017
    “…This proposes a passive forgery detection to detect the most common type of forgery, which is copy-move attack. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Face Detection System / Chan Beh Teng by Chan, Beh Teng

    Published 2004
    “…The system will generate an output where every detected face will be indicated with a rectangle on a copy of the original image. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Online Tool to Detect Plagiarized Students' Solutions for Classes' Assignments by Khdair, Hisham S.M

    Published 2010
    “…Most of the existing plagiarism detection systems compare documents to archived sources in enterprise databases. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Relevance detection and summarizing strategies identification algorithm using linguistic measures / Seyed Asadollah Abdiesfandani by Seyed Asadollah, Abdiesfandani

    Published 2016
    “…The system is also able to detect copy- verbatim strategy, the most commonly strategy used by students. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10
  11. 11

    Smart room system with dual authentication by Harun, Muhammad Hazmi, Abdul Rahid@Abdul Rashid, Nurul Najwa

    Published 2025
    “…The face recognition system relies on OpenCV for accurate face detection, capturing face only during system operation, whether a successful or unsuccessful attempt occurs. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Development of electronic nose for classification of aromatic herbs using Artificial Intelligent techniques by Che Soh, Azura, Mohamad Radzi, Nur Fadzilah, Mohamad Yusof, Umi Kalsom, Ishak, Asnor Juraiza, Hassan, Mohd Khair

    Published 2018
    “…Two classification methods, Artificial Neural Network (ANN) and Adaptive Neuro-Fuzzy Inference System (ANFIS) were used in order to investigate the performance of classification accuracy for this E-nose system. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    A framework of enhanced authentication for PDF textual documents using Zigzag-LSB embedding algorithm by Nur Alya Afikah, Usop

    Published 2024
    “…The effectiveness of the algorithm has been established since it uses an image-based approach after conversion between document and images with a numbering pattern that is fragile to deletion, replacement, insertion, combine, and copy attack. …”
    Get full text
    Get full text
    Thesis
  14. 14

    A novel approach towards tamper detection of digital holy Quran generation by Islam, Md. Milon, Kabir, M. Nomani, Sadi, Muhammad Sheikh, Morsalin, Md. Istiak, Haque, Ahsanul, Wang, Jing

    Published 2020
    “…Hence, verifying the Quran expression has become a crucial issue for most of the online users who read the digital copy. We propose a novel approach for the tamper detection of a digital document of the Holy Quran. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Defect Detection And Classification Of Silicon Solar Wafer Featuring Nir Imaging And Improved Niblack Segmentation by Mahdavipour, Zeinab

    Published 2016
    “…Meanwhile, a set of descriptors corresponding to Elliptic Fourier Features shape description is extracted for each defect and is evaluated for each cluster to use for clustering and classification part. The classification combines the analysis of defect intensity features, the application of unsupervised k-mean clustering and multi-class SVM algorithms. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Mitigation of Mach Zehnder modulator nonlinearity in millimeter wave radio over fiber system using digital predistortion by Duraikannan, Shankar

    Published 2017
    “…The proposed adaptive digital pre-distortion is based on memory polynomial (MP) model with indirect learning architecture (ILA) where the predistorter is modeled as an inverse polynomial model of the nonlinear RoF system. The predistorter is the copy of the training filter that is connected as the post distorter to the nonlinear RoF system. …”
    Get full text
    Get full text
    Thesis
  18. 18