Search Results - (( java application testing algorithm ) OR ( data identification matching algorithm ))

Refine Results
  1. 1

    AR oriented pose matching mechanism from motion capture data by Iqbal J., Sidhu M.S., Ariff M.B.M.

    Published 2023
    “…In order to extract the exact matched pose, the frame sequence is divided into pose feature frame and skeletal data frame by the use of pose matching dance training movement recognition algorithm (PMDTMR). …”
    Article
  2. 2

    An improved plant identification system by Fuzzy c-means bag of visual words model and sparse coding by Safa, Soodabeh, Khalid, Fatimah

    Published 2020
    “…Performance of proposed methods surpass the classic bag of words algorithm for plant identification tasks.…”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  4. 4

    An efficient method of biometric matching using interpolated ECG data by Sidek, Khairul Azami, Sufi, Fahim, Khalil, Ibrahim, Al-Shammary, Dhiah

    Published 2010
    “…Results of experiments confirmed that the template matching using interpolation method achieved better accuracy (up to 4.46%) than the existing method without interpolation when using ECG data with lower sampling rate.…”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  5. 5

    Identification and control of a small-scale helicopter by Deboucha, A., Taha, Z.

    Published 2010
    “…This identification process is based on the well-known gradient descent learning algorithm. …”
    Get full text
    Article
  6. 6
  7. 7

    Fingerprint feature extraction based discrete cosine transformation (DCT) by Chin Kim On, Paulraj M. Pandiyan, Sazali Yaacob, Azali Saudi

    Published 2009
    “…The extracted nCT data is used as input for the backpropagation neural network training for personal identification.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceedings
  8. 8
  9. 9
  10. 10

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…Performance Testing is used to test the performance of algorithm implementations in applications. …”
    Get full text
    Get full text
    Journal
  11. 11

    An Ar Natural Marker Similarities Measurement Algorithm For E-Biodiversity by Tan, Mei Synn, Wang, Yin Chai

    Published 2018
    “…Algorithms of investigation starting with span from extraction, matching and classification to determine the interest point of flower species, like colour and shape features information. …”
    Get full text
    Get full text
    Proceeding
  12. 12

    Context identification of scientific papers via agent-based model for text mining (ABM-TM) by Mahmoud M.A., Ahmad M.S., Yusoff M.Z.M., Mustapha A.

    Published 2023
    “…Subsequently, based on the strength of each keyword and the threshold value, the algorithm facilitates the identification of the paper�s potential context. � Springer International Publishing Switzerland 2015.…”
    Article
  13. 13

    Approach For Optimizing Course Recommendation Based On Integrating Modified Felder-Silverman Learning Style Model With Meta-Heuristics Algorithm by Ashraf, Erum

    Published 2023
    “…This research streamlines course selection by matching it with learners' styles. It involves identifying potential courses learning style, validated through genetic and surrogate meta-heuristics optimization algorithms, and employing Felder-Silverman model for learning style identification. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    Preserving the topology of self-organizing maps for data analysis: A review by Bariah, Yusob, Zuriani, Mustaffa, Siti Mariyam, Shamsuddin

    Published 2020
    “…This paper presents detail explanation on SOM learning algorithm and its applications. Some issues related to SOM's architecture are also discussed, namely the formulation of training data from input samples, and the Best Matching Unit (BMU) identification for better visualization of large datasets, and improvement made to the SOM algorithm.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16
  17. 17

    Effective query structuring with ranking using named entity categories for XML retrieval by Roko, Abubakar

    Published 2016
    “…Furthermore, it employs Predicates Identification Algorithm (PIA) and Entity Identification Algorithm (EIA) to identify user search intention. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  20. 20

    Speech processing for makhraj recognition (design adaptive filter for noise removal) by Siti Nurmaisarah, Abdul Aziz

    Published 2010
    “…The filtered data will be processed to match the standard pronunciations and it will be integrated with filter design process in MATLAB. …”
    Get full text
    Get full text
    Undergraduates Project Papers