Search Results - (( copy detection system algorithm ) OR ( panel classification using algorithm ))
Search alternatives:
- panel classification »
- classification using »
- system algorithm »
- using algorithm »
- copy detection »
-
1
Depth frame loss concealment for wireless transmission utilising motion detection information
Published 2014“…The methods are able to facilitate a frame copy algorithm and a high correlation of colour and depth frames to conceal depth frame loss. …”
Get full text
Get full text
Thesis -
2
Image authentication using Scale Invariant Feature Transform (SIFT) / Nurul Anis Suriana Adnan
Published 2017“…This proposes a passive forgery detection to detect the most common type of forgery, which is copy-move attack. …”
Get full text
Get full text
Thesis -
3
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
4
-
5
Face Detection System / Chan Beh Teng
Published 2004“…The system will generate an output where every detected face will be indicated with a rectangle on a copy of the original image. …”
Get full text
Get full text
Thesis -
6
Adaptive digital watermarking system for authentication of intellectual properties
Published 2011Get full text
Get full text
Get full text
Book Chapter -
7
Online Tool to Detect Plagiarized Students' Solutions for Classes' Assignments
Published 2010“…Most of the existing plagiarism detection systems compare documents to archived sources in enterprise databases. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
Relevance detection and summarizing strategies identification algorithm using linguistic measures / Seyed Asadollah Abdiesfandani
Published 2016“…The system is also able to detect copy- verbatim strategy, the most commonly strategy used by students. …”
Get full text
Get full text
Thesis -
9
-
10
-
11
Smart room system with dual authentication
Published 2025“…The face recognition system relies on OpenCV for accurate face detection, capturing face only during system operation, whether a successful or unsuccessful attempt occurs. …”
Get full text
Get full text
Get full text
Article -
12
Development of electronic nose for classification of aromatic herbs using Artificial Intelligent techniques
Published 2018“…Two classification methods, Artificial Neural Network (ANN) and Adaptive Neuro-Fuzzy Inference System (ANFIS) were used in order to investigate the performance of classification accuracy for this E-nose system. …”
Get full text
Get full text
Get full text
Article -
13
A framework of enhanced authentication for PDF textual documents using Zigzag-LSB embedding algorithm
Published 2024“…The effectiveness of the algorithm has been established since it uses an image-based approach after conversion between document and images with a numbering pattern that is fragile to deletion, replacement, insertion, combine, and copy attack. …”
Get full text
Get full text
Thesis -
14
A novel approach towards tamper detection of digital holy Quran generation
Published 2020“…Hence, verifying the Quran expression has become a crucial issue for most of the online users who read the digital copy. We propose a novel approach for the tamper detection of a digital document of the Holy Quran. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Defect Detection And Classification Of Silicon Solar Wafer Featuring Nir Imaging And Improved Niblack Segmentation
Published 2016“…Meanwhile, a set of descriptors corresponding to Elliptic Fourier Features shape description is extracted for each defect and is evaluated for each cluster to use for clustering and classification part. The classification combines the analysis of defect intensity features, the application of unsupervised k-mean clustering and multi-class SVM algorithms. …”
Get full text
Get full text
Thesis -
16
The classification of skateboarding trick manoeuvres: A K-nearest neighbour approach
“…A variation of k-NN algorithms were tested based on the number of neighbours, as well as the weight and the type of distance metric used. …”
Get full text
Get full text
Article -
17
Mitigation of Mach Zehnder modulator nonlinearity in millimeter wave radio over fiber system using digital predistortion
Published 2017“…The proposed adaptive digital pre-distortion is based on memory polynomial (MP) model with indirect learning architecture (ILA) where the predistorter is modeled as an inverse polynomial model of the nonlinear RoF system. The predistorter is the copy of the training filter that is connected as the post distorter to the nonlinear RoF system. …”
Get full text
Get full text
Thesis -
18
