Search Results - (( java application clustering algorithm ) OR ( based constructing detection algorithm ))
Search alternatives:
- application clustering »
- constructing detection »
- based constructing »
- java application »
-
1
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
2
A Toolkit for Simulation of Desktop Grid Environment
Published 2014“…The prototypes will be developed using JAVA language united with a MySQL database. Core functionality of the simulator are job generation, volunteer generation, simulating algorithms, generating graphical charts and generating reports. …”
Get full text
Get full text
Final Year Project -
3
Hybrid weight deep belief network algorithm for anomaly-based intrusion detection system
Published 2022“…Recently, researchers suggested a deep belief network (DBN) algorithm to construct and build a network intrusion detection system (NIDS) for detecting attacks that have not been seen before. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
4
-
5
Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform
Published 2009“…The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Cloud-based lightweight detection of hardhat compliance based on YOLOv5 in power construction site
Published 2025“…Based on You Only Look Once (YOLO) v5, A cloud-based real-time hardhat-wearing compliance detection system was proposed to detect workers not wearing hardhats in power construction sites. …”
Get full text
Get full text
Thesis -
7
Enhanced Community Detection Based On Cross Time For Higher Visibility In Supply Chain: A Six-Steps Model Framework
Published 2019“…This paper proposed six steps model framework that aim: (1) To construct the nodes and vertices for temporal graph representing the relationship in supply chain network; (2) To propose an enhanced temporal community detection algorithm in graph analytics based on Cross-time approach and (3) To evaluate the enhanced temporal community detection algorithm in graph analytics for representing relationship in supply chain network based on external and internal quality analysis. …”
Get full text
Get full text
Get full text
Article -
8
A web-based implementation of k-means algorithms
Published 2022“…Firstly, k-luster could incorporate additional clustering algorithms, or even classification algorithms in the future. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
9
-
10
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
11
Finding objects with segmentation strategy based multi robot exploration in unknown environment
Published 2013“…Two algorithms were investigated in this paper one is frontier based random search algorithm and the second is efficient algorithm based on segmentation strategy. …”
Get full text
Get full text
Get full text
Article -
12
A novel steganography algorithm using edge detection and MPC algorithm
Published 2019“…In this paper, we propose an efficient steganography algorithm which applies edge detection and MPC algorithm for data concealment in digital images. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
A Pairwise Test Suite Generator based on Melody Search Algorithm
Published 2016“…This paper aims to introduce MS as a pairwise testing strategy called a Pairwise Test suite generator based Melody Search Algorithm (PTMS). A pairwise testing is an operative approach in the combinatorial test suite construction. …”
Get full text
Get full text
Get full text
Get full text
Article -
14
Comparison of UAV flying height parameter for crack detection applications / Wan Nurdayini Batrisyia Wan Ghazali
Published 2024“…Aerial photographs were taken using UAV at various heights and the images were then rectified to get the orthoimages. Next, the DoG algorithm was applied for the detection of visible cracks, and the results were compared with manually outlined cracks to determine the degree of the algorithm’s credibility. …”
Get full text
Get full text
Student Project -
15
Image Detection Model for Construction Worker Safety Conditions using Faster R-CNN
Published 2024journal::journal article -
16
Test case generation from state machine with OCL constraints using search-based techniques / Aneesa Ali Ali Saeed
Published 2017“…This model driven approach was integrated with the proposed infeasible path detection method which based on analyzing various OCL constructs and operations. …”
Get full text
Get full text
Get full text
Thesis -
17
Real-time Personal Protective Equipment (PPE) compliance detection system using you only look once version 5 / Nur Amielia Natasha Mohamad Nazli
Published 2023“…The project utilizes the You Only Look Once (YOLO) algorithm as the detection algorithm, namely version 5. …”
Get full text
Get full text
Thesis -
18
The application of suitable sports games for junior high school students based on deep learning and artificial intelligence
Published 2025“…In HMDB51 dataset, the proposed average detection accuracy of ST-GCN action recognition algorithm based on MediaPipe framework reaches 88.3%. …”
Get full text
Get full text
Get full text
Article -
19
Approach for detecting lane line boundaries / Mamadou Baldeh
Published 2020“…In this paper, previous vision based lane detection studies are reviewed in terms of three aspects, which are lane detection algorithms, integration, and evaluation methods. …”
Get full text
Get full text
Thesis -
20
