Search Results - (( identification implementation method algorithm ) OR ( java implementation from algorithm ))
Search alternatives:
- identification implementation »
- implementation method »
- java implementation »
- implementation from »
- method algorithm »
- from algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
-
3
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
4
Register Transfer Level Implementation Of Pooling - Based Feature Extraction For Finger Vein Identification
Published 2017“…Many improvements methods were utilized to increase the speed and accuracy of the identification. …”
Get full text
Get full text
Thesis -
5
Smoothed functional algorithm with norm-limited update vector for identification of continuous-time fractional-order Hammerstein Models
Published 2024“…In particular, the standard smoothed functional algorithm (SFA) based method is modified by implementing a limit function in the update vector of the standard SFA based method to solve the issue of high tendency of divergence during the identification process. …”
Get full text
Get full text
Get full text
Article -
6
-
7
An implementation of open systems interconnection (OSI) transport layer P2P identification algorithm using Netflow and Netfilter as a P2P traffic firewall / Amir Herman Amiruddin
Published 2014“…The purpose of this dissertation was to implement OSI Transport Layer P2P identification algorithm using Netflow and Netfilter as a P2P traffic firewall. …”
Get full text
Get full text
Thesis -
8
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…The offline scheme utilizes a Time-based One-Time Password (TOTP) algorithm to allow users to authenticate to the vehicle without needing an Internet connection once they have registered online when Internet access is available. …”
Get full text
Get full text
Thesis -
9
-
10
Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter
Published 2019“…It does not consider the LACE algorithm implemented in huge number of server in one Cloud datacenter. …”
Get full text
Get full text
Thesis -
11
SYSTEM IDENTIFICATION AND MODEL PREDICTIVE CONTROL FOR INTERACTING SERIES PROCESS WITH NONLINEAR DYNAMICS
Published 2009“…Several important issues in the identification process and real-time implementation of model predictive control algorithm are also discussed. …”
Get full text
Get full text
Thesis -
12
Route Optimization System
Published 2005“…Using that process, we have settled on Java as our development platform as we found it able to both implement DA and the GIS component (map display and manipulation). …”
Get full text
Get full text
Final Year Project -
13
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
14
Feature identification in a real surface metrology analysis by means of Double Iteration Sobel (DIS) / Ainaa Farhanah Mohd Razali
Published 2022“…Although there are many feature identification and feature extraction procedures to identify and extract the features on the surfaces based on segmentation methods as presented in previous studies, problem arises when most of them are unable to fulfil the requirements when being implemented on a particular surface topography such as unable to point out at which exact data points the edges features are actually located. …”
Get full text
Get full text
Thesis -
15
Real-time system identification of an unmanned quadcopter system using fully tuned radial basis function neural networks
Published 2021“…To prevent the neurons and network parameters selection dilemma during trial and error approach, RBF with EMRAN training algorithm is proposed. This automatic tuning algorithm will implement the network growing and pruning method to add or eliminate neurons in the RBF. …”
Get full text
Get full text
Article -
16
DEVELOPMENT OF IRIS RECOGNITION SYSTEM
Published 2016“…This project implements an iris recognition algorithm as a biometric identification. …”
Get full text
Get full text
Final Year Project -
17
Real-time system identification of an unmanned quadcopter system using fully tuned radial basis function neural networks
Published 2021“…To prevent the neurons and network parameters selection dilemma during trial and error approach, RBF with EMRAN training algorithm is proposed. This automatic tuning algorithm will implement the network growing and pruning method to add or eliminate neurons in the RBF. …”
Get full text
Get full text
Article -
18
Gender identification using support vector machines
Published 2023“…This thesis is introduces SVM theory application and its algorithmic implementations.…”
text::Thesis -
19
Identification of continuous-time model of hammerstein system using modified multi-verse optimizer
Published 2021“…his thesis implements a novel nature-inspired metaheuristic optimization algorithm, namely the modified Multi-Verse Optimizer (mMVO) algorithm, to identify the continuous-time model of Hammerstein system. …”
Get full text
Get full text
Thesis -
20
