Search Results - (( developing interactive computing algorithm ) OR ( java detection system algorithm ))
Search alternatives:
- developing interactive »
- interactive computing »
- computing algorithm »
- system algorithm »
- java detection »
-
1
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
2
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013“…The experimental results show that the blood vessel detection system has worked well in the ARM platform with the Android OS. …”
Get full text
Get full text
Conference or Workshop Item -
3
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…An Intrusion Detection System is software or application which is used to detect thread, malicious activities and the unauthorized access to the computer system and warn the administrators by generating alarms. …”
Get full text
Get full text
Thesis -
4
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…A GUI is created in a form of JAVA application to display data detected from tag. …”
Get full text
Get full text
Thesis -
5
Detection and extraction features for signatures images via different techniques
Published 2019Get full text
Get full text
Conference or Workshop Item -
6
Text steganalysis using evolution algorithm approach
Published 2012“…This study presents a new alternative of steganalysis method in order to detect hidden messages in text steganalysis called Evolution Detection Steganalysis System (EDSS) based on the evolution algorithm approach under Java Genetic Algorithms Package (JGAP). …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
-
8
-
9
-
10
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
11
-
12
-
13
-
14
Visualization Tool for Pathfinding Algorithms
Published 2023Get full text
Get full text
Final Year Project Report / IMRAD -
15
Human emotion recognition for computer games player using AdaBoost algorithm / Muhamad Nur Adhwa Muhamad Shukri
Published 2017“…In conclusion, this application was developed in order to help computer games player make the best decision before purchasing a computer game on market. …”
Get full text
Get full text
Thesis -
16
Heuristic task scheduling algorithms for optimal resource utilisation in grid computing
Published 2020“…The demand for high computational power has developed more rapidly in the past few years. …”
Get full text
Get full text
Get full text
Article -
17
-
18
A variable combinatorial test suite strategy based on modified greedy algorithm
Published 2015“…Several researchers have been addressed the combinatorial interaction testing issues by developing the various strategies based on a search-based approach or a pure-computational approach, although, these are useful, but most of them have a lack to support the variable strength interaction which is one of CIT techniques. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
T-way testing : a test case generator based on melody search algorithm
Published 2015Get full text
Get full text
Undergraduates Project Papers -
20
Developing class scheduler system / Mohamed Imran Mohamed Ariff
Published 2006Get full text
Get full text
Research Reports
