Search Results - (( development strategy detection algorithm ) OR ( java data function algorithm ))
Search alternatives:
- development strategy »
- strategy detection »
- function algorithm »
- data function »
- java »
-
1
Fuzzy modeling using Bat Algorithm optimization for classification
Published 2018“…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
2
Missing tags detection algorithm for radio frequency identification (RFID) data stream
Published 2019“…Thus in this research, an AC complement algorithm with hashing algorithm and Detect False Negative Read algorithm (DFR) is used to developed the Missing Tags Detection Algorithm (MTDA). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
3
Relevance detection and summarizing strategies identification algorithm using linguistic measures / Seyed Asadollah Abdiesfandani
Published 2016“…The system is also able to detect copy- verbatim strategy, the most commonly strategy used by students. …”
Get full text
Get full text
Thesis -
4
Using Heuristic Rules from Sentence Decomposition of Experts' Summaries to Detect Students' Summarizing Strategies
Published 2008“…We developed an algorithm based on the heuristic rules and performed some experiments to evaluate and support the technique proposed.…”
Get full text
Get full text
Article -
5
A review of YOLO algorithm and its applications in autonomous driving object detection
Published 2025“…Firstly, the development and distinctions among the YOLO series of detection algorithms are explained, and their performance is analyzed. …”
Get full text
Get full text
Get full text
Article -
6
Pre-processing strategies for skin detection using MLP
Published 2011“…The Sum of Weights strategy also gave 1.37% more correct detection than the best combining skin feature strategy. …”
Get full text
Get full text
Get full text
Thesis -
7
-
8
Pairwise Test Suite Generation Based on Hybrid Artificial Bee Colony Algorithm
Published 2020“…There are many researchers that have been developed a pairwise testing strategy. Complementing to the earlier researches, this paper proposes a new pairwise test suite generation called Pairwise Hybrid Artificial Bee Colony (PhABC) strategy based on hybridize of an Artificial Bee Colony (ABC) algorithm with a Particle Swarm Optimization (PSO) algorithm. …”
Get full text
Get full text
Article -
9
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
On Adopting Parameter Free Optimization Algorithms for Combinatorial Interaction Testing
Published 2015“…Recently, in line with the upcoming field called Search based Software Engineering (SBSE), many newly strategies have been developed adopting specific optimization algorithm (e.g. …”
Get full text
Get full text
Get full text
Article -
11
Hybrid test redundancy reduction strategy based on global neighborhood algorithm and simulated annealing
Published 2018“…There are already many works in the literature exploiting the greedy computational algorithms as well as the meta-heuristic algorithms, but no single strategy can claim dominance in terms of test data reduction over their counterparts. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
13
Sequence-based interaction testing implementation using Bees Algorithm
Published 2023“…T-way strategies is used to generate test data to detect faults due to interaction. …”
Conference paper -
14
-
15
Sequence and sequence-less t-way test suite generation strategy based on the elitist flower pollination algorithm
Published 2018“…Addressing these aforementioned issues and complementing the existing sequence based strategies such as t-SEQ, Sequence Covering Array Generator and Bee Algorithm, this thesis presents a unified strategy based on the new meta-heuristic algorithm, called the Elitist Flower Pollination Algorithm (eFPA). …”
Get full text
Get full text
Thesis -
16
Design And Development Of Collision Avoidance Strategy For Differential Drive Mobile Robot
Published 2018“…In this work, it is shown that both algorithms provide good collision avoidance strategy with a maximum error of only 5cm.…”
Get full text
Get full text
Monograph -
17
-
18
Web-based RIG performance reporting system using interactive visualization techniques / Amir Hambaly Nasaruddin
Published 2019“…For the user to analyze the result, the system provides visual analytics technique which can educate the user on analyzing the result which is drill down and sorting function to educate users. The result of this project is all algorithm for visualizing data is functioning and the output produced from the system is correct and effective. …”
Get full text
Get full text
Thesis -
19
Backpropagation neural network based on local search strategy and enhanced multi-objective evolutionary algorithm for breast cancer diagnosis
Published 2019“…Then, we hybrid the enhanced algorithm with the local search strategy to ensures the acceleration of the convergence speed to the non-dominated front. …”
Get full text
Get full text
Get full text
Article -
20
Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
Published 2009“…The system includes two main functions; first is the hiding of the information in unused area 2 of PE-file (.EXE file), through the execution of four process (specify the cover file, specify the information file, encryption of the information, and hiding the information) and the second function is the extraction of the hiding information through three process (specify the steno file, extract the information, and decryption of the information) and The proposed system is implemented by using java.…”
Get full text
Get full text
Get full text
Article
