Search Results - (( developing interactive graph algorithm ) OR ( java detection using algorithm ))
Search alternatives:
- developing interactive »
- interactive graph »
- graph algorithm »
- using algorithm »
- java detection »
-
1
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
2
VISUALIZATION OF GENETIC ALGORITHM BASED ON 2-D GRAPH TO ACCELERATE THE SEARCHING WITH HUMAN INTERVENTIONS.
Published 2012“…Hence, a novel humanmachine interaction is developed in the proposed approach. …”
Get full text
Get full text
Thesis -
3
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
4
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Parameter estimation of multivariable system using Fuzzy State Space Algorithm / Razidah Ismail … [et al.]
Published 2011“…In the next phase, the transformation of FSSM to fuzzy graph is studied. The theory from directed graphs is explored to define and interpret the interconnections structure underlying the dynamics of the interacting systems. …”
Get full text
Get full text
Research Reports -
6
Detection and extraction features for signatures images via different techniques
Published 2019Get full text
Get full text
Conference or Workshop Item -
7
Static and dynamic graphs modeling of a boiler system / Noor Ainy Harish
Published 2015“…These results lead to the development of the third graph which represent a combination of the two processes in the boiler. …”
Get full text
Get full text
Thesis -
8
Identification of microcalcification in mammographic images / Noor Azliza Abdul Shauti
Published 2008“…By using this identification, it can simulate in flexible images post processing and analysis in easy image management using Java aplication. …”
Get full text
Get full text
Thesis -
9
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…An Intrusion Detection System is software or application which is used to detect thread, malicious activities and the unauthorized access to the computer system and warn the administrators by generating alarms. …”
Get full text
Get full text
Thesis -
10
Fitness value based evolution algorithm approach for text steganalysis model
Published 2013“…In this paper, we present a new alternative method for text steganalysis based on an evolution algorithm, implemented using the Java Evolution Algorithms Package (JEAP).The main objective of this paper is to detect the existence of hidden messages ased on fitness values of a text description.It is found that the detection performance has been influenced by two groups of fitness values which are good fitness value and bad fitness value. …”
Get full text
Get full text
Article -
11
Text steganalysis using evolution algorithm approach
Published 2012Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…A GUI is created in a form of JAVA application to display data detected from tag. …”
Get full text
Get full text
Thesis -
13
Collective interaction filtering with graph-based descriptors for crowd behaviour analysis
Published 2018“…The group detection experiment is implemented using the clustering algorithm. Normalized Mutual Information and Rand Index are used to measure the performance of Collective Interaction Filtering. …”
Get full text
Get full text
Thesis -
14
-
15
Interactive learning package for artificial neural network (Demonstration Module) / Camellia Mohd Kamal
Published 2004“…For Perception there will be the Description Neuron Model, Perceptron Basic Architecture and perceptron Algorithm with one example of solved problem. For the Feed Forward, Recurrent and Self Organizing Map Networks there are the Neuron Model, Basic Architecture and Training Algorithm. …”
Get full text
Get full text
Thesis -
16
-
17
Sequence t-way test generation using the barnacles mating optimizer algorithm
Published 2021“…More precisely, we focus on the generation of test cases due to the ordering of inputs (or sequence) using the newly developed Barnacles Mating Optimizer (BMO) Algorithm. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
Graphing calculator exposure of mathematics learning in a partially technology incorporated environment
Published 2017“…Situated in a traditional classroom setting where there is more teaching and less hands-on, it reports foundation students’ acceptance of technology-in-mathematics interaction in a typical course enriched with graphing calculator (GC) deliberated in the worksheets with printed GC commands alongside each question. …”
Get full text
Get full text
Get full text
Get full text
Article -
19
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…For example,the spammer changes patterns of message for making spam such as writing the message by JavaScript, using different advertising images and words to form features or attributes. …”
Get full text
Get full text
Thesis -
20
A maximal-clique-based clustering approach for multi-observer multi-view data by using k-nearest neighbor with S-pseudo-ultrametric induced by a fuzzy similarity
Published 2024“…Under this framework, different algorithms have been developed where the output relies on an exact distance calculated based on the objects’ features. …”
Get full text
Get full text
Article
