Search Results - (( automatic identification problems algorithm ) OR ( java implementation some algorithm ))
Search alternatives:
- identification problems »
- java implementation »
- implementation some »
- some algorithm »
-
1
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
2
-
3
-
4
Fingerprint feature extraction based discrete cosine transformation (DCT)
Published 2009“…In this paper, a simple and effectiveness algorithm is proposed for fingerprint image recognition and the proposed algorithm is able to solve the problem discussed above. …”
Get full text
Get full text
Get full text
Get full text
Proceedings -
5
Automatic identification of epileptic seizures from EEG signals using sparse representation-based classification
Published 2020“…A computerized seizure identification scheme can eradicate the above problems, assist clinicians, and benefit epilepsy research. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
6
CORROSION DAMAGE ANALYSIS USING IMAGE PROCESSING
Published 2018“…There is a need to develop a low cost automatic corrosion damage identification. This project focuses on early detection of pipelines and gas tanks corrosion in oil and gas. …”
Get full text
Get full text
Final Year Project -
7
Route Optimization System
Published 2005“…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
Get full text
Get full text
Final Year Project -
8
Advances in automatic insect classification
Published 2014“…There have been several attempts to create a method to perform insect identification accurately. Great knowledge and experience on entomology are required for accurate insect identification. …”
Get full text
Get full text
Get full text
Article -
9
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…It is shown that the implementation of AES encryption algorithm is capable to secure data stored in HDFS to some extent.…”
Get full text
Get full text
Conference or Workshop Item -
10
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…It is shown that the implementation of AES encryption algorithm is capable to secure data stored in HDFS to some extent.…”
Get full text
Get full text
Conference or Workshop Item -
11
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
12
Simulated real-time controller for tuning algorithm using modified hill climbing approach
Published 2014“…That led to new ways to tackle old problems like model inaccuracies and inconsistencies. …”
Get full text
Get full text
Thesis -
13
Adaptive differential evolution algorithm with fitness based selection of parameters and mutation strategies / Rawaa Dawoud Hassan Al-Dabbagh
Published 2015“…Secondly, a new DE algorithm (ARDE-SPX) is introduced that automatically adapts a repository of DE strategies and parameters control schemes to avoid the problems of stagnation and make DE respond to a wide range of function characteristics at different stages of evolutionary search. …”
Get full text
Get full text
Thesis -
14
Detection and Severity Identification of control valve stiction in industrial loops using integrated partially retrained CNN-PCA frameworks
Published 2021“…In this thesis, an integrated framework using such partially retrained convolutional neural networks in conjunction with principal component analysis (CNN-PCA) is proposed for simultaneous control valve stiction detection and automatic identification of the severity of the problem. …”
Get full text
Get full text
Thesis -
15
Fuzzy modeling using Bat Algorithm optimization for classification
Published 2018“…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
16
-
17
-
18
Implementation of RIO in UMJaNetSim / Chan Chin We
Published 2004“…In this project, I will do some research on the recent TCP congestion control and avoidance mechanisms and implement one of the mechanisms into the Java Network Simulator (JaNetSim). …”
Get full text
Get full text
Thesis -
19
Comparison of performances of Jaya Algorithm and Cuckoo Search algorithm using benchmark functions
Published 2022“…This paper aims to compare the performance of two metaheuristic algorithms which are Jaya Algorithm (JA) and Cuckoo Search (CS) using some common benchmark functions. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Real-time identification of an unmanned quadcopter flight dynamics using fully tuned radial basis function network
Published 2018“…Recursive learning algorithms, such as Constant Trace (CT) can be implemented to solve insufficient training data and over-fitting problems by developing a new model from real-time flight data in each time step. …”
Get full text
Get full text
Get full text
Get full text
Thesis
