Search Results - (( developing interactive cell algorithm ) OR ( java detection learning algorithm ))
Search alternatives:
- developing interactive »
- detection learning »
- learning algorithm »
- interactive cell »
- cell algorithm »
- java detection »
-
1
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
2
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Features selection process can be considered a problem of global combinatorial optimization in machine learning. Genetic algorithm GA had been adopted to perform features selection method; however, this method could not deliver an acceptable detection rate, lower accuracy, and higher false alarm rates. …”
Get full text
Get full text
Thesis -
3
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…In the second phase, a classifier ensemble learning model is proposed consisting of separate outputs: (i) To select a relevant subset of original features based on Binary Quantum Gravitational Search Algorithm (QBGSA), (ii) To mine data streams using various data chunks and overcome a failure of single classifiers based on SVM, MLP and K-NN algorithms. …”
Get full text
Get full text
Thesis -
4
A review of open-source image analysis tools for mammalian cell culture: algorithms, features and implementations
Published 2023“…Computer scientists have developed algorithms to automate cell imaging analysis, but they are not widely adopted by biologists, especially those lacking an interactive platform. …”
Get full text
Get full text
Get full text
Get full text
Article -
5
Inter-cell and intra-cell layout design in a cellular manufacturing system
Published 2011“…To validate the developed algorithm, the results obtained by the algorithm are compared to the results of an exhaustive search. …”
Get full text
Get full text
Conference or Workshop Item -
6
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
7
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…The outcome of this study will add to the body of knowledge the most important and recent proposed solutions to mitigate SQL injection attack, in particular those based on machine learning algorithm…”
Get full text
Get full text
Get full text
Article -
8
-
9
An AUSM-based high-order compact method for solving Navier-Stokes equations
Published 2023“…A high-order compact upwind algorithm is developed for solving Navier-Stokes equations in two-space dimensions. …”
Article -
10
-
11
Adaptive mesh refinement immersed boundary method for simulations of laminar flows past a moving thin elastic structure
Published 2020“…Hence, in this work, an algorithm is developed to simulate fluid-structure interactions of moving deformable structures with very thin thicknesses. …”
Get full text
Get full text
Article -
12
-
13
Development of hippocampus MRI image segmentation algorithm for progression detection of alzheimer’s disease (AD)
Published 2022“…This study indicates developing an algorithm for detecting and progressing through the hippocampus of patients with Alzheimer's disease in MRI images. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
14
EMG signal classification for human computer interaction: a review
Published 2009“…With the ever increasing role of computerized machines in society, Human Computer Interaction (HCI) system has become an increasingly important part of our daily lives. …”
Get full text
Get full text
Get full text
Article -
15
Numerical simulation of fluid flow in three dimensional domain based on two stage pressure-velocity correction method
Published 2015“…The stability of the developing method remain at the same level with other immersed boundary methods. …”
Get full text
Get full text
Conference or Workshop Item -
16
Numerical simulation of fluid flow in three dimensional domain based on two stage pressure-velocity correction method
Published 2015“…The stability of the developing method remain at the same level with other immersed boundary methods. …”
Get full text
Get full text
Conference or Workshop Item -
17
Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions
Published 2017“…Future work should be focusing on data collection of the E-Nose sensors and the improvement of the learning algorithm robustness towards environmental noise during data acquisition, such as evaporation and contamination of odor samples.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
18
Study on an application of bioengineering by layer TIRF measurement
Published 2013“…The nature inside bacterial cell has traditionally been viewed as an environment where intermolecular interactions are governed by isotropic diffusion. …”
Get full text
Get full text
Thesis -
19
Braille display systems for blind people with haptic belt
Published 2021Get full text
Get full text
Get full text
Article -
20
Finite Element Modeling Of Ballistic Penetration into Fabric Armor
Published 2006“…An automatic geometry generation algorithm for textile is developed that can generate complex fabric geometries spanning several unit cells. …”
Get full text
Get full text
Thesis
