Search Results - (( developing automatic optimization algorithm ) OR ( java detection using algorithm ))
Search alternatives:
- automatic optimization »
- developing automatic »
- using algorithm »
- java detection »
-
1
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…Feature subset selection and classifier ensemble learning are familiar techniques with high ability to optimize above problems. Recently, various techniques based on different algorithms have been developed. …”
Get full text
Get full text
Thesis -
2
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
3
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
4
-
5
-
6
Semi-automatic cortical boundary detection / Noor Elaiza Abdul Khalid.
Published 2010“…For this purpose, two algorithm are has been developed to automatically detect the OC and IC. …”
Get full text
Get full text
Thesis -
7
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
-
9
Automatic design, optimization and In-Situ Fabrication of Heterogeneous Swarm Robot bodies using 3-D printing and multi-objective evolutionary algorithms
Published 2012“…In this research, an artificial evolution approach utilizing Single-Objective Evolutionary Algorithm (SOEA) and Multi-Objective Evolutionary Algorithm (MOEA) respectively are investigated in the automatic design and optimization of the morphology of a Six Articulated-Wheeled Robot (SAWR) with climbing ability. …”
Get full text
Get full text
Research Report -
10
Multichannel optimization with hybrid spectral- entropy markers for gender identification enhancement of emotional-based EEGs
Published 2021“…Secondly, it aims to develop an automatic gender recognition model by employing optimization algorithms to identify the most effective channels for gender identification from emotional-based EEG signals. …”
Get full text
Get full text
Article -
11
Application of Evolutionary Algorithm for Assisted History Matching
Published 2014“…Today, tremendous efforts are made to develop Automatic History Matching algorithms. While the automatic method focus on optimization which is normally computer based. …”
Get full text
Get full text
Final Year Project -
12
AUTOMATIC ROUTE FINDER FOR NEW VISITORS
Published 2006“…Automatic Route Finder tool for New Visitors is developed to help them to find or plan the shortest and effective way in order to reach their destination without loss of time. …”
Get full text
Get full text
Final Year Project -
13
Automatic Number Plate Recognition on android platform: With some Java code excerpts
Published 2016“…Hence, the objective of this research is to propose suitable and optimize algorithm for ANPR system on Android mobile phone. …”
Get full text
Get full text
Get full text
Book -
14
Detection and extraction features for signatures images via different techniques
Published 2019Get full text
Get full text
Conference or Workshop Item -
15
-
16
Identification of microcalcification in mammographic images / Noor Azliza Abdul Shauti
Published 2008“…By using this identification, it can simulate in flexible images post processing and analysis in easy image management using Java aplication. …”
Get full text
Get full text
Thesis -
17
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…An Intrusion Detection System is software or application which is used to detect thread, malicious activities and the unauthorized access to the computer system and warn the administrators by generating alarms. …”
Get full text
Get full text
Thesis -
18
Assessment of ANN-based auto-reclosing scheme developed on single machine-infinite bus model with IEEE 14-bus system model data
Published 2009“…The results show the efficacy of the developed adaptive automatic reclosing method.…”
Get full text
Get full text
Conference or Workshop Item -
19
Hybrid Harmony Search Algorithm with Grey Wolf Optimizer and Modified Opposition-based Learning
Published 2019“…In this paper, a hybrid algorithm of HS with grey wolf optimizer (GWO) has been developed to solve the problem of HS parameter selection. …”
Get full text
Get full text
Get full text
Article -
20
Fitness value based evolution algorithm approach for text steganalysis model
Published 2013“…In this paper, we present a new alternative method for text steganalysis based on an evolution algorithm, implemented using the Java Evolution Algorithms Package (JEAP).The main objective of this paper is to detect the existence of hidden messages ased on fitness values of a text description.It is found that the detection performance has been influenced by two groups of fitness values which are good fitness value and bad fitness value. …”
Get full text
Get full text
Article
