Search Results - (( developing solving delay algorithm ) OR ( java detection using algorithm ))
Search alternatives:
- developing solving »
- delay algorithm »
- using algorithm »
- java detection »
-
1
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
2
One-step block methods for solving ordinary and delay differential equations
Published 2011“…A new modified algorithm from the existing program for solving ODEs was developed. …”
Get full text
Get full text
Thesis -
3
Block multistep methods for solving first order retarded and neutral delay differential equations
Published 2015“…A new subroutine function has been added in the developed algorithm with the capabilities to approximate the neutral delay term using the interpolation of function evaluation. …”
Get full text
Get full text
Thesis -
4
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
5
Predictor-corrector scheme in modified block method for solving delay differential equations with constant lag
Published 2014“…In this developed algorithm, each coefficient in the predictor and corrector formula are recalculated when the step size changing. …”
Get full text
Get full text
Get full text
Article -
6
Predictor-corrector scheme in modified block method for solving delay differential equations with constant lag
Published 2014“…In this developed algorithm, each coefficient in the predictor and corrector formula are recalculated when the step size changing. …”
Get full text
Get full text
Get full text
Article -
7
Development of a two-level trade credit model with shortage for deteriorating products using hybrid metaheuristic algorithm
Published 2015“…This proves the capability of the developed hybrid algorithm in solving the formulated model.…”
Get full text
Get full text
Thesis -
8
Solving delay differential equations (DDEs) using nakashima's 2 stages 4th order Pseudo-Runge-Kutta method
Published 2013“…This paper is investigate numerically the problem on solving Delay Differential Equations (DDEs) using Nakashima’s 2 Stages 4th Order Pseudo-Runge-Kutta Method and also developed the algorithm of Nakashima’s 2 Stages 4th Order Pseudo-Runge-Kutta Method incorporates with Hermite Interpolation. …”
Get full text
Non-Indexed Article -
9
Multistep block methods for solving higher order delay differential equations
Published 2016“…This thesis describes the development of numerical algorithms for solving higher order DDEs. …”
Get full text
Get full text
Get full text
Thesis -
10
Adam’s type block methods for solving neutral delay differential equation with constant and panthograph delay
Published 2019“…The block methods have also produced less computational time in solving NDDE with con- stant and pantograph delay types.…”
Get full text
Get full text
Thesis -
11
Numerical solution of delay differential equation using two-derivative Runge-Kutta type method with Newton interpolation
Published 2022“…Numerical approach of two-derivative Runge-Kutta type method with three-stage fifth-order (TDRKT3(5)) is developed and proposed for solving a special type of third-order delay differential equations (DDEs) with constant delay. …”
Get full text
Get full text
Article -
12
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
Diagonally multistep block method for solving Volterra integro-differential equation with delay
Published 2023“…Volterra integro-differential equation with delay (VIDED) is solved using a diagonally multistep block method (DMB). …”
Get full text
Get full text
Article -
14
Detection and extraction features for signatures images via different techniques
Published 2019Get full text
Get full text
Conference or Workshop Item -
15
An enhanced mobile internet protocol version 6 (IPv6) with multicast function and hierarchical design.
Published 2006“…Mobile IPv6 mechanism requires some handover algorithm when it changes its point of attachment in the Internet.An enhanced micro mobility handover algorithm is developed on top of mobile IPv6. …”
Get full text
Patent -
16
Identification of microcalcification in mammographic images / Noor Azliza Abdul Shauti
Published 2008“…By using this identification, it can simulate in flexible images post processing and analysis in easy image management using Java aplication. …”
Get full text
Get full text
Thesis -
17
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…An Intrusion Detection System is software or application which is used to detect thread, malicious activities and the unauthorized access to the computer system and warn the administrators by generating alarms. …”
Get full text
Get full text
Thesis -
18
Determination of order delivery time in event organizer industry using a non-delay scheduling approach / Nur Indrianti and Vina Islamia Vervly Suandevin
Published 2020“…As a case study, the modified non-delay algorithm is examined to solve the problem of an EO in Indonesia. …”
Get full text
Get full text
Get full text
Article -
19
Fitness value based evolution algorithm approach for text steganalysis model
Published 2013“…In this paper, we present a new alternative method for text steganalysis based on an evolution algorithm, implemented using the Java Evolution Algorithms Package (JEAP).The main objective of this paper is to detect the existence of hidden messages ased on fitness values of a text description.It is found that the detection performance has been influenced by two groups of fitness values which are good fitness value and bad fitness value. …”
Get full text
Get full text
Article -
20
Text steganalysis using evolution algorithm approach
Published 2012Get full text
Get full text
Get full text
Conference or Workshop Item
