Search Results - (( java applications using algorithm ) OR ( source detection using algorithm ))
Search alternatives:
- applications using »
- java applications »
- source detection »
- using algorithm »
-
1
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
2
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
3
An Adaptive Switching Cooperative Source Searching And Tracing Algorithms For Underwater Acoustic Source Localization
Published 2019“…In a source searching task, two possible scenarios can occur: source detected and source not detected. …”
Get full text
Get full text
Thesis -
4
Cooperative source detection using an optimized distributed levy flight algorithm
Published 2023“…Source signal detection plays important roles in many real-world target searching problems. …”
Get full text
Get full text
Get full text
Article -
5
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
6
Cooperative Source Detection Using An Optimized Distributed Levy Flight Algorithm
Published 2023“…Cooperative Source Detection Using An Optimized Distributed Levy Flight Algorithm by Mad Helmi Ab. …”
Get full text
article -
7
Cooperative source detection using an optimized distributed levy flight algorithm
Published 2024“…Cooperative source detection using an optimized distributed levy flight algorithm by Mad Helmi Ab. …”
Get full text
article -
8
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
10
Real-time algorithmic music composition application.
Published 2022“…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
11
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
Get full text
Get full text
Conference or Workshop Item -
12
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
13
Application of genetic algorithm and JFugue in an evolutionary music generator
Published 2025“…This project explores the application of Genetic Algorithms (GA) with JFugue, which is a Java-based music programming library to develop an Evolutionary Music Generator. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
14
A pothole boundary detection algorithm using image segmentation technique in urban road
Published 2025“…This study introduces a specialized algorithm designed to precisely detect and delineate the boundaries of potholes using advanced image segmentation techniques. …”
Get full text
Get full text
Get full text
Get full text
Article -
15
-
16
Route Optimization System
Published 2005“…The method used to develop this project is Rapid Application Development (RAD). …”
Get full text
Get full text
Final Year Project -
17
LTE-based passive radar for ground target detection and tracking
Published 2015“…Passive radar system constitute of a receiver without the co-located transmitter. It uses non-cooperated illumination sources for target detection and tracking. …”
Get full text
Get full text
Thesis -
18
Behaviour Analysis Among Adolescents And Children For Cyberbullying Based On Twitter And Kaggle Dataset
Published 2023“…The purpose of this study is to see the accuracy of the algorithms and compare it. The highest algorithm will be chosen as the best model and algorithm that can be used to detect cyberbullying tweet text.…”
Get full text
Get full text
Undergraduates Project Papers -
19
Water Pollution Source Identification Based on Real-Time Monitoring System in Siak River
Published 2021“…Data collected from the sensor analyzed use algorithm to find and check the abnormal and behavior data changing by the time. …”
Get full text
Get full text
Conference or Workshop Item -
20
Enhancing XSS vulnerability detection and removal in web applications using genetic algorithms
Published 2024“…Another limitation is the limited or lack of focus on the removal of XSS vulnerabilities after their detection in the source code. Consequently, an approach called XSS-DETREM has been proposed with the objectives of combining genetic algorithms with static analysis, and a code replacement technique to detect and remove XSS vulnerabilities, respectively, to address the problem of XSS at the source code level. …”
Get full text
Get full text
Get full text
Thesis
