Search Results - (( java implementation among algorithm ) OR ( opening classification using algorithm ))
Search alternatives:
- opening classification »
- implementation among »
- classification using »
- java implementation »
- among algorithm »
- using algorithm »
-
1
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
2
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
3
A Toolkit for Simulation of Desktop Grid Environment
Published 2014“…A simulator for desktop grid environment has been developed using Java as the implementation language due to its wide popularity. …”
Get full text
Get full text
Final Year Project -
4
Development of I-Complain@META: a complaint management system for FKMT students using naive bayes classification algorithm
Published 2024Get full text
final_year_project -
5
Detecting canopy openings in logged-over forests: a multi-classifier analysis of PlanetScope imagery
Published 2024“…Three different classification algorithms, namely maximum likelihood classifier (MLC), support vector machine (SVM) and object-based image analysis (OBIA) were used and compared to identify canopy opening areas. …”
Get full text
Get full text
Article -
6
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…According to the simulation results, the proposed algorithm produces the best solution among all algorithms in the proposed cases. � 2021 Little Lion Scientific…”
Review -
7
Waste management using machine learning and deep learning algorithms
Published 2020“…The model that we have used are the classification models. For our research we did the comparisons between three Machine Learning algorithms, namely Support Vector Machine (SVM), Random Forest, and Decision Tree, and one Deep Learning algorithm called Convolutional Neural Network (CNN), to find the optimal algorithm that best fits for the waste classification solution. …”
Get full text
Get full text
Get full text
Get full text
Article -
8
Network game (Literati) / Chung Mei Kuen
Published 2003“…The main aspect of this thesis is to produce a networked gaming system, which process players. requested to play the game and enabling users to play the graphical game with people through the network. The algorithm design and implementation method must not only be workable, but also highly efficient in terms of execution speed and response time. …”
Get full text
Get full text
Thesis -
9
Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak
Published 2019“…The fourth stage is to design evaluation methodology of Max-Min Rule-Based Classification Algorithm using classifier model. Finally, both algorithms are validated against the findings in various literatures. …”
Get full text
Get full text
Thesis -
10
-
11
-
12
Text spam messages classification using Artificial Immune System (AIS) algorithms
Published 2024thesis::master thesis -
13
An efficient intrusion detection model based on hybridization of artificial bee colony and dragonfly algorithms for training multilayer perceptrons
Published 2020“…However, the problem of improving the accuracy and efficiency of classification models remains open and yet to be resolved. …”
Get full text
Get full text
Get full text
Article -
14
-
15
Android Mobile Malware Classification Based on System Call and Permission Using Tokenization
Published 2024thesis::master thesis -
16
-
17
Machine Learning Classifications of Multiple Organ Failures in a Malaysian Intensive Care Unit
Published 2025“…This study aims to perform the classification of multiple organ failures using machine learning algorithms based on SOFA score. …”
Article -
18
Android Mobile Malware Surveillance Exploitation via Call Logs: Proof of Concept
Published 2024Subjects:Conference Paper -
19
-
20
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…The simulation is implemented with iFogSim and java programming language. …”
Get full text
Get full text
Article
