Search Results - (( developing copy detection algorithm ) OR ( java loading optimization algorithm ))
Search alternatives:
- loading optimization »
- developing copy »
- copy detection »
- java »
-
1
A keypoint based copy-move forgery detection and localization in digital images / Somayeh Sadeghi
Published 2015“…The true and false positive rates achieved by the proposed algorithm outperform several current detection algorithms.…”
Get full text
Get full text
Thesis -
2
Ant colony optimization algorithm for load balancing in grid computing
Published 2012“…This research proposes an enhancement of the ant colony optimization algorithm that caters for dynamic scheduling and load balancing in the grid computing system. …”
Get full text
Get full text
Get full text
Monograph -
3
Enhancement of Ant Colony Optimization for Grid Job Scheduling and Load Balancing
Published 2011“…This research proposes an Enhanced Ant Colony Optimization (EACO) algorithm that caters dynamic scheduling and load balancing in the grid computing system. …”
Get full text
Get full text
Get full text
Thesis -
4
Depth frame loss concealment for wireless transmission utilising motion detection information
Published 2014“…The methods are able to facilitate a frame copy algorithm and a high correlation of colour and depth frames to conceal depth frame loss. …”
Get full text
Get full text
Thesis -
5
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
6
Resource management in grid computing using ant colony optimization
Published 2011“…Resources with high pheromone value are selected to process the submitted jobs.Global pheromone update is performed after completion processing the jobs in order to reduce the pheromone value of resources.A simulation environment was developed using Java programming to test the performance of the proposed EACO algorithm against other ant based algorithm, in terms of resource utilization.Experimental results show that EACO produced better grid resource management solution.…”
Get full text
Get full text
Get full text
Get full text
Monograph -
7
Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter
Published 2019“…Cloudsim is used as Discrete Event Simulation tool and Java as coding language to evaluate LACE algorithm. …”
Get full text
Get full text
Thesis -
8
Online Tool to Detect Plagiarized Students' Solutions for Classes' Assignments
Published 2010“…The aim of this study is to develop an online tool to detect plagiarism and cheating for students' assignments focusing on those who copy from each others'. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
Face Detection System / Chan Beh Teng
Published 2004“…The system will generate an output where every detected face will be indicated with a rectangle on a copy of the original image. …”
Get full text
Get full text
Thesis -
10
Region duplication forgery detection technique based on keypoint matching / Diaa Mohammed Hassan Uliyan
Published 2016“…Furthermore, the proposed methods are resistant to forgery where small up to 8*8 pixels and flat regions are involved, with little visual structures. The average detection rate of our algorithm maintained 96 % true positive rate and 7 % false positive rate which outperform several current detection methods. …”
Get full text
Get full text
Thesis -
11
Relevance detection and summarizing strategies identification algorithm using linguistic measures / Seyed Asadollah Abdiesfandani
Published 2016“…The system is also able to detect copy- verbatim strategy, the most commonly strategy used by students. …”
Get full text
Get full text
Thesis -
12
An enhanced soft set data reduction using decision partition order technique
Published 2017“…The decomposition scenario in Rose’s and Kumar’s algorithms detects the reduction, but could not obtain the optimal decision. …”
Get full text
Get full text
Thesis -
13
Integrated analysis of copy number and loss of heterozygosity in primary breast carcinomas using high-density SNP array
Published 2011“…This will facilitate the uncovering of true driver genes pertinent to breast cancer biology and the develop-ment of prospective therapeutics.…”
Get full text
Get full text
Article -
14
An improved framework for content-based spamdexing detection
Published 2020Get full text
Get full text
Get full text
Article -
15
Image splicing forgery detection based on low-dimensional singular value decomposition of discrete cosine transform coefficients
Published 2019“…Digital image forgery has significantly increased due to the rapid development of several tools of image manipulation. …”
Get full text
Get full text
Article -
16
Smart room system with dual authentication
Published 2025“…It uses the Histogram of Oriented Gradients (HOG) algorithm for face recognition, which results in lower power consumption and faster processing. …”
Get full text
Get full text
Get full text
Article -
17
