Search Results - (( data estimation techniques algorithm ) OR ( java detection using algorithm ))
Search alternatives:
- estimation techniques »
- data estimation »
- using algorithm »
- java detection »
-
1
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
2
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
3
Semiparametric inference procedure for the accelarated failure time model with interval-censored data
Published 2019“…The findings of this research provide two new iterative algorithms for estimating the parameters of the AFT model with interval-censored data, and also two new resampling techniques for estimating the covariance matrix of estimators. …”
Get full text
Get full text
Get full text
Thesis -
4
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Detection and extraction features for signatures images via different techniques
Published 2019Get full text
Get full text
Conference or Workshop Item -
6
Reduced rank technique for joint channel estimation and joint data detection in TD-SCDMA systems
Published 2013“…The adopted reduced rank technique is based on singular value decomposition algorithm. …”
Get full text
Get full text
Article -
7
System identification using Extended Kalman Filter
Published 2017“…Besides, Extended Kalman Filter (EKF) algorithm was selected in this project as an algorithm for offline estimation data purposes. …”
Get full text
Get full text
Student Project -
8
Reduced Rank Technique for Joint Channel Estimation and Joint Data Detection in TD-SCDMA Systems
Published 2012“…The adopted reduced rank technique is based on singular value decomposition algorithm. …”
Get full text
Get full text
Article -
9
Identification of microcalcification in mammographic images / Noor Azliza Abdul Shauti
Published 2008“…By using this identification, it can simulate in flexible images post processing and analysis in easy image management using Java aplication. …”
Get full text
Get full text
Thesis -
10
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…An Intrusion Detection System is software or application which is used to detect thread, malicious activities and the unauthorized access to the computer system and warn the administrators by generating alarms. …”
Get full text
Get full text
Thesis -
11
Analysis of multiexponential transient signals using interpolation-based deconvolution and parametric modeling techniques
Published 2003“…Direct deconvolution approach often leads to poor resolution of ihe estimated decay rates since the fast Fourier transform (FFT) algorithm is used to analyze the resulting deconvolved data. …”
Get full text
Get full text
Proceeding Paper -
12
Reduced-rank technique for joint channel estimation in TD-SCDMA systems.
Published 2013“…The adopted reduced rank technique is based on singular value decomposition algorithm. …”
Get full text
Get full text
Article -
13
Fitness value based evolution algorithm approach for text steganalysis model
Published 2013“…In this paper, we present a new alternative method for text steganalysis based on an evolution algorithm, implemented using the Java Evolution Algorithms Package (JEAP).The main objective of this paper is to detect the existence of hidden messages ased on fitness values of a text description.It is found that the detection performance has been influenced by two groups of fitness values which are good fitness value and bad fitness value. …”
Get full text
Get full text
Article -
14
Pose estimation algorithm for mobile Augmented Reality based on inertial sensor fusion
Published 2021“…Furthermore, gyroscope sensor data is incorporated with the vision-based pose estimation. …”
Get full text
Get full text
Get full text
Article -
15
Text steganalysis using evolution algorithm approach
Published 2012Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Non pilot and pilot aided least square channel estimation algorithm in MIMO-OFDM system / Nursarah Ainaa Abdul Halim
Published 2013“…This project is about analyze and implement channel estimation techniques for MIMO-OFDM Systems with Least Squares (LS) Algorithm channel estimation by comparing non pilot and pilot aided result and the result is supposed the Pilot aided will have a better performance.…”
Get full text
Get full text
Thesis -
17
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…A GUI is created in a form of JAVA application to display data detected from tag. …”
Get full text
Get full text
Thesis -
18
Dynamic Robust Bootstrap Algorithm for Linear Model Selection Using Least Trimmed Squares
Published 2009“…Unfortunately, many statistics practitioners are not aware of the fact that most of the classical bootstrap techniques are based on the OLS estimates which is sensitive to outliers. …”
Get full text
Get full text
Thesis -
19
The comparison study among optimization techniques in optimizing a distribution system state estimation
Published 2017“…The states of these systems are first estimated through centralized approach using the proposed algorithm to compare with weighted least squares technique. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
20
The development of parameter estimation method for Chinese hamster ovary model using black widow optimization algorithm
Published 2020“…Metaheuristic parameter estimation is an algorithm framework that is processed using some technique to generate a pattern or graph. …”
Get full text
Get full text
Get full text
Article
