Search Results - (( data detection modified algorithm ) OR ( java implementation case algorithm ))
Search alternatives:
- java implementation »
- implementation case »
- detection modified »
- data detection »
- case algorithm »
-
1
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
2
-
3
A Modified ACO-based Search Algorithm for Detecting Protein Functional Module From Protein Interaction Network
Published 2015“…Various graph clustering algorithms have been applied to protein interaction networks for detecting protein functional modules. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
-
5
Pairwise testing tools based on hill climbing algorithm (PTCA)
Published 2014“…The actual implementation of the algorithm which is in Java programming language, the program is implemented on Net Bean 7.0.1. …”
Get full text
Get full text
Undergraduates Project Papers -
6
Examination timetabling using genetic algorithm case study: KUiTTHO
Published 2005Get full text
Get full text
Thesis -
7
Java based expert system for selection of natural fibre composite materials
Published 2013“…In this paper, we develop a technology for the materials selection system using Java based expert system. The weighted-range method (WRM) was implemented to identify the range value and to scrutinise the candidate materials. …”
Get full text
Get full text
Get full text
Article -
8
Modified damage location indices in beam-like structure: Analytical study
Published 2011“…It is also concluded that the modified algorithms have the sensitivity to detect the damage regardless of its severity. …”
Get full text
Get full text
Article -
9
A novel steganography algorithm using edge detection and MPC algorithm
Published 2019“…In this paper, we propose an efficient steganography algorithm which applies edge detection and MPC algorithm for data concealment in digital images. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Temporal video segmentation using squared form of Krawtchouk-Tchebichef moments
Published 2018“…Rapid growth of multimedia data in cyberspace caused a swift rise in data transmission volume. …”
Get full text
Get full text
Get full text
Thesis -
11
-
12
Robust diagnostics and variable selection procedure based on modified reweighted fast consistent and high breakdown estimator for high dimensional data
Published 2022“…Therefore, the robust location and covariance matrix based on the MRFCH is used instead of the classical estimators to tackle these problems. The proposed algorithm has been applied to detect outliers in the high dimensional data. …”
Get full text
Get full text
Thesis -
13
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…According to the simulation results, the proposed algorithm produces the best solution among all algorithms in the proposed cases. � 2021 Little Lion Scientific…”
Review -
14
An enhanced sequential exception technique for semantic-based text anomaly detection
Published 2019“…ESET performs text anomaly detection by employing optimized Cosine Similarity, hybridizing LSA with modified SET, and integrating it with Word Sense Disambiguation algorithms specifically Lesk and Selectional Preference. …”
Get full text
Get full text
Get full text
Thesis -
15
Modified least trimmed squares method for face recognition / Nur Azimah Abdul Rahim
Published 2018“…It can be concluded that the modified algorithm decreases the biases, the variances and the mean squared errors of the LTS estimators. …”
Get full text
Get full text
Thesis -
16
Investigation Of Edge Detection Techniques Based On Brain Tumor Images
Published 2018“…The images undergo three fundamental steps of edge detection techniques. The edge detection operators used to detect the brain tumor are Robert zero-crossing, Sobel operator, Prewitt operator, Canny operator and modified Canny algorithm. …”
Get full text
Get full text
Monograph -
17
Failure detection analysis of grid-connected photovoltaic systems in tropical climate region / Nurmalessa Muhammad @ Atan
Published 2020“…A modified threshold-based technique was used to build the FD algorithm based on data from PV system installed at GERC UiTM, Malaysia. …”
Get full text
Get full text
Thesis -
18
Comparison of performances of Jaya Algorithm and Cuckoo Search algorithm using benchmark functions
Published 2022“…CS and JA have implemented in the same platform (Intellij IDEA Community Edition 2020.2.3) using the same language (Java). …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
20
Testing static single cell faults using static and dynamic data background
Published 2011“…A conventional March Test Algorithm can be modified by using the DB management scheme to form a new March Test Algorithm (referred to as Mod March Test Algorithm), e.g., MATS++(6N) becoming Mod MATS++(6N). …”
Get full text
Get full text
Conference or Workshop Item
