Search Results - (( java implementation among algorithm ) OR ( code classification system algorithm ))
Search alternatives:
- classification system »
- implementation among »
- java implementation »
- code classification »
- system algorithm »
- among algorithm »
-
1
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
2
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
3
Genetic algorithm fuzzy logic for medical knowledge-based pattern classification
Published 2018“…This research proposed an algorithm named Genetic Algorithm Fuzzy Logic (GAFL) with Pittsburg approach for rules learning and induction in genetic fuzzy system knowledge discovery. …”
Get full text
Get full text
Article -
4
Image classification based on sparse-coded features using sparse coding technique for aerial imagery: a hybrid dictionary approach
Published 2023“…Aerial photography; Aircraft detection; Antennas; Codes (symbols); Discrete cosine transforms; Discrete wavelet transforms; Glossaries; Image classification; Image coding; Image enhancement; Learning algorithms; Learning systems; Object recognition; Remote sensing; Satellite imagery; Satellites; Unmanned aerial vehicles (UAV); Discrete tchebichef transforms; Discriminative features; Finite Ridgelet Transform; Histogram of oriented gradients; Image processing and computer vision; Scale invariant feature transforms; SIFT; Sparse coding; Classification (of information)…”
Article -
5
A Toolkit for Simulation of Desktop Grid Environment
Published 2014“…A simulator for desktop grid environment has been developed using Java as the implementation language due to its wide popularity. …”
Get full text
Get full text
Final Year Project -
6
Maldroid- attribute selection analysis for malware classification
Published 2019“…Hence, the objective of this paper is to find the most effective and efficient attribute selection and classification algorithm in malware detection. Moreover, in order to get the best combination between attribute selection and classification algorithm, eight attributes selection and seven categories machine learning algorithm are applied in this study. …”
Get full text
Get full text
Get full text
Article -
7
Genetic algorithm fuzzy logic for medical knowledge-based pattern classification
Published 2023“…This research proposed an algorithm named Genetic Algorithm Fuzzy Logic (GAFL) with Pittsburg approach for rules learning and induction in genetic fuzzy system knowledge discovery. …”
Article -
8
Crow Search Freeman Chain Code (CS-FCC) feature extraction algorithm for handwritten character recognition
Published 2023Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
-
10
Whale Optimisation Freeman Chain Code (WO-FCC) extraction algorithm for handwritten character recognition
Published 2021Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Object-Oriented Programming semantics representation utilizing agents
Published 2011“…The algorithm requires source codes comparison based on keyword similarity to extract the words that exist in the two related source codes. …”
Get full text
Get full text
Get full text
Article -
12
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…According to the simulation results, the proposed algorithm produces the best solution among all algorithms in the proposed cases. � 2021 Little Lion Scientific…”
Review -
13
The development of virtual product life cycle design tool using artificial intelligence technique
Published 2008“…The generated features from code classification algorithm give the information of machining parameter through the mapping algorithm. …”
Get full text
Monograph -
14
-
15
Network game (Literati) / Chung Mei Kuen
Published 2003“…The main aspect of this thesis is to produce a networked gaming system, which process players. requested to play the game and enabling users to play the graphical game with people through the network. The algorithm design and implementation method must not only be workable, but also highly efficient in terms of execution speed and response time. …”
Get full text
Get full text
Thesis -
16
POWER QUALITY CLASSIFICATION WITH DE-NOISING SCHEME USING WAVELET TRANSFORM AND RULE- BASED METHOD
Published 2012“…The performance of the classification system would be greatly degraded. To overcome this difficulty and to improve the performance of the system, a de-noising scheme is proposed to be used together with the system. …”
Get full text
Get full text
Thesis -
17
Classification of metamorphic virus using n-grams signatures
Published 2020“…Metamorphic virus has a capability to change, translate, and rewrite its own code once infected the system to bypass detection. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
Modelling of clinical risk groups (CRGs) classification using FAM
Published 2006“…FAM is a fast learning algorithm and used less epoch training [4]. Based on its performance in doing the classification, FAM is theoretically suitable to do the CRGs classification. …”
Get full text
Get full text
Conference or Workshop Item -
19
REAL TIME ABNORMAL SOUND DETECTION AND CLASSIFICATION FOR HOME ENVIRONMENT
Published 2011“…In this project, a system is designed to have abnormal sound detection and classification. …”
Get full text
Get full text
Final Year Project -
20
Malware Classification and Detection using Variations of Machine Learning Algorithm Models
Published 2025“…Malware attacks are attacks carried out by an attacker by sending malicious codes to various files or even many packages and servers. …”
Get full text
Get full text
Get full text
Article
