Search Results - (( developing agent method algorithm ) OR ( java detection using algorithm ))
Search alternatives:
- developing agent »
- method algorithm »
- using algorithm »
- java detection »
- agent method »
-
1
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
2
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
3
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Detection and extraction features for signatures images via different techniques
Published 2019Get full text
Get full text
Conference or Workshop Item -
5
AGENT MEETING SCHEDULER
Published 2011“…Qualitative research method is being used to gather necessary data on agent algorithm and this data will be used to select the suitable algorithm. …”
Get full text
Get full text
Final Year Project -
6
Identification of microcalcification in mammographic images / Noor Azliza Abdul Shauti
Published 2008“…By using this identification, it can simulate in flexible images post processing and analysis in easy image management using Java aplication. …”
Get full text
Get full text
Thesis -
7
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…An Intrusion Detection System is software or application which is used to detect thread, malicious activities and the unauthorized access to the computer system and warn the administrators by generating alarms. …”
Get full text
Get full text
Thesis -
8
Fitness value based evolution algorithm approach for text steganalysis model
Published 2013“…In this paper, we present a new alternative method for text steganalysis based on an evolution algorithm, implemented using the Java Evolution Algorithms Package (JEAP).The main objective of this paper is to detect the existence of hidden messages ased on fitness values of a text description.It is found that the detection performance has been influenced by two groups of fitness values which are good fitness value and bad fitness value. …”
Get full text
Get full text
Article -
9
Text steganalysis using evolution algorithm approach
Published 2012Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…A GUI is created in a form of JAVA application to display data detected from tag. …”
Get full text
Get full text
Thesis -
11
Agent-based extraction algorithm for computational problem solving
Published 2015“…Four agents have been proposed as an agent based model for CPS, which are User_Agent, PAC_Agent, IPO_Agent and Algorithm_Agent. …”
Get full text
Get full text
Thesis -
12
Three-dimensional coverage control for multi-unmanned aerial vehicle
Published 2024“…This study proposes a 3D coverage control algorithm to address complex real-world scenarios, wherein the 3D control algorithm will be developed based on the 2D MBC scheme. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
13
Development of gene motif modulation for information processing in artificial DNA computing
Published 2014“…In the artificial DNA computing model, the MAS (Multi-Agent System) algorithm depicts the sender agent transmits moleware information through the control agent which is then converted to binary data as input to the receiver agent. …”
Get full text
Get full text
Get full text
Proceeding Paper -
14
Recent research in cooperative path planning algorithms for multi-agent using mixed- integer linear programming
Published 2016“…There are a number of cooperative path planning methods available in the literature for multi-agent including Cell Decomposition, Roadmap and Potential Field to name but three. …”
Get full text
Get full text
Article -
15
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…For example,the spammer changes patterns of message for making spam such as writing the message by JavaScript, using different advertising images and words to form features or attributes. …”
Get full text
Get full text
Thesis -
16
Deep reinforcement learning to multi-agent deep reinforcement learning
Published 2022“…In fact, overall goal in this paper is a comprehensive explanation of the various Deep Reinforcement Learning (DRL) algorithms, and its combination with Multi-Agent methods. …”
Get full text
Get full text
Article -
17
Network routing by mobile agents for image retrieval using fuzzy genetic algorithms
Published 2005“…This research proposes a method to minimize a network routing time taken by the mobile agents using genetic algorithm (GA) to collect query datasets from different hosts from the World Wide Web. …”
Get full text
Get full text
Monograph -
18
Development of a Negotiation Support Model for Value Management in Construction
Published 2009“…The methodology is based on a theoretical approach which consists of value-based decision nature in construction VM, multicriteria group decision making, game theory, negotiation theory, and agent-based development. This methodology combines value analysis method using Function Analysis System Technique (FAST); Life Cycle Cost analysis, group decision analysis method based on Analytical Hierarchy Process (AHP), and Game theory-based agent system to develop a negotiation support. …”
Get full text
Get full text
Final Year Project -
19
A modified crow search algorithm with niching technique for numerical optimization
Published 2019“…The search agent of the primitive crow search algorithm does not always follow the best solution obtained so far. …”
Get full text
Get full text
Conference or Workshop Item -
20
A modified crow search algorithm with niching technique for numerical optimization
Published 2019“…The search agent of the primitive crow search algorithm does not always follow the best solution obtained so far. …”
Get full text
Get full text
Conference or Workshop Item
