Search Results - (( java detection using algorithm ) OR ( program implementing software algorithm ))
Search alternatives:
- implementing software »
- program implementing »
- software algorithm »
- using algorithm »
- java detection »
-
1
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
2
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Ultimately, the algorithm development program designed earlier is linked up directly to the robotic model for program implementation and verification. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Evolutionary cost-cognizant regression test case prioritization for object-oriented programs
Published 2019“…Afterward evolutionary algorithm (EA) was employed to prioritize test cases based on the rate severity of fault detection per unit test cost. …”
Get full text
Get full text
Thesis -
4
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
5
Pairwise testing tools based on hill climbing algorithm (PTCA)
Published 2014“…The actual implementation of the algorithm which is in Java programming language, the program is implemented on Net Bean 7.0.1. …”
Get full text
Get full text
Undergraduates Project Papers -
6
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Implementation of repetitive control algorithm in reducing vibration using MATLAB/SIMULINK / Mohamad Zuhairy Mohamed
Published 2008“…MATLAB programming is sue to design the repetitive controller after that its implement to the SIMULINK software. …”
Get full text
Get full text
Student Project -
8
Detection and extraction features for signatures images via different techniques
Published 2019Get full text
Get full text
Conference or Workshop Item -
9
Reusability techniques in load-flow analysis computer program
Published 2004“…These methodologies made the developed load-flow analysis software flexible for future enhancement. Adding and changing codes and algorithm of the software can be done without affecting much the existing codes and algorithms. …”
Get full text
Get full text
Article -
10
Implementation Of Hardware Software Partitioning In Embedded System
Published 2018Get full text
Get full text
Monograph -
11
Controller And Circuitry Design And Implementation For Fire Fighting Robot For MIROC 2014 Competition
Published 2014“…The software algorithm design can be broken into two parts; the navigation algorithm, which controls the movement of the actual robot, and the motor control algorithm, which provides for stability. …”
Get full text
Get full text
Final Year Project -
12
Identification of microcalcification in mammographic images / Noor Azliza Abdul Shauti
Published 2008“…By using this identification, it can simulate in flexible images post processing and analysis in easy image management using Java aplication. …”
Get full text
Get full text
Thesis -
13
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…An Intrusion Detection System is software or application which is used to detect thread, malicious activities and the unauthorized access to the computer system and warn the administrators by generating alarms. …”
Get full text
Get full text
Thesis -
14
Rapid software framework for the implementation of machine learning classification models
Published 2021“…The machine learning model in the two platforms were tested on breast cancer and tax avoidance datasets with Decision Tree algorithm. The results indicated that although the software framework is easier than the programming platform for implementing the machine learning model, the results from the software framework were highly accurate and reliable. …”
Get full text
Get full text
Article -
15
Fitness value based evolution algorithm approach for text steganalysis model
Published 2013“…In this paper, we present a new alternative method for text steganalysis based on an evolution algorithm, implemented using the Java Evolution Algorithms Package (JEAP).The main objective of this paper is to detect the existence of hidden messages ased on fitness values of a text description.It is found that the detection performance has been influenced by two groups of fitness values which are good fitness value and bad fitness value. …”
Get full text
Get full text
Article -
16
Text steganalysis using evolution algorithm approach
Published 2012Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Security mechanism for wireless Mobile Ad Hoc Networks (MANET)
Published 2006“…This project uses LabVIEW (version 6.0) a graphical programming software by National Instrument. The security mechanism consists of encryption and decryption method as being implemented using LabVIEW software. …”
Get full text
Get full text
Student Project -
18
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…A GUI is created in a form of JAVA application to display data detected from tag. …”
Get full text
Get full text
Thesis -
19
Movie recommendation system / Najwa Syamimie Hasnu
Published 2020Get full text
Get full text
Thesis -
20
A study on solution of matrix riccati differential equations using ant colony programming and simulink / Mohd Zahurin Mohamed Kamali
Published 2015“…It has been found that by implementing the ACP algorithm, the solution predicted is approximately close or similar to the exact solution. …”
Get full text
Get full text
Thesis
