Search Results - (( java application customization algorithm ) OR ( writer classification techniques algorithm ))
Search alternatives:
- customization algorithm »
- writer classification »
- java application »
- techniques »
-
1
Discretization of integrated moment invariants for writer identification
Published 2008“…Successive exploration is executed to investigate for the suitability of discretization techniques in probing the issues of writer authorship. …”
Get full text
Get full text
Conference or Workshop Item -
2
A New Swarm-Based Framework for Handwritten Authorship Identification in Forensic Document Analysis
Published 2014“…Therefore, feature extraction and selection of the unique individual significant features are very important in order to identify the writer, moreover to improve the classification accuracy. …”
Get full text
Get full text
Book Chapter -
3
A new swarm-based framework for handwritten authorship identification in forensic document analysis
Published 2014“…Therefore, feature extraction and selection of the unique individual significant features are very important in order to identify the writer, moreover to improve the classification accuracy. …”
Get full text
Get full text
Book Chapter -
4
Arabic Calligraphy Classification using Triangle Model for Digital Jawi Paleography Analysis
Published 2011“…Calligraphy classification of the ancient manuscripts gives useful information to paleographers. …”
Get full text
Get full text
Conference or Workshop Item -
5
Arabic Calligraphy Classification using Triangle Model for Digital Jawi Paleography Analysis
Published 2011“…Calligraphy classification of the ancient manuscripts gives useful information to paleographers. …”
Get full text
Get full text
Conference or Workshop Item -
6
Features Extraction of Arabic Calligraphy using extended Triangle Model for Digital Jawi Paleography Analysis
Published 2013“…The information helps paleographer to identify date, writer, number of writers, place of origin, and the originality of manuscripts. …”
Get full text
Get full text
Article -
7
Android: S-Based Technique in Mobile Malware Detection
Published 2018“…It causes files to be corrupted and secret information being compromised. Nowadays malware writers try to avoid detection from malware detectors using several techniques such as polymorphism and metamorphism. …”
Get full text
Get full text
Get full text
Article -
8
Invariants discretization for individuality representation in handwritten authorship
Published 2008“…Writer identification is one of the areas in pattern recognition that have created a center of attention by many researchers to work in. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
10
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item
