Search Results - (( java implementation case algorithm ) OR ( building visualization using algorithm ))
Search alternatives:
- building visualization »
- java implementation »
- implementation case »
- using algorithm »
- case algorithm »
-
1
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
2
-
3
Pairwise testing tools based on hill climbing algorithm (PTCA)
Published 2014“…The actual implementation of the algorithm which is in Java programming language, the program is implemented on Net Bean 7.0.1. …”
Get full text
Get full text
Undergraduates Project Papers -
4
Examination timetabling using genetic algorithm case study: KUiTTHO
Published 2005Get full text
Get full text
Thesis -
5
Java based expert system for selection of natural fibre composite materials
Published 2013“…In this paper, we develop a technology for the materials selection system using Java based expert system. The weighted-range method (WRM) was implemented to identify the range value and to scrutinise the candidate materials. …”
Get full text
Get full text
Get full text
Article -
6
-
7
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…According to the simulation results, the proposed algorithm produces the best solution among all algorithms in the proposed cases. � 2021 Little Lion Scientific…”
Review -
8
Comparison of performances of Jaya Algorithm and Cuckoo Search algorithm using benchmark functions
Published 2022“…CS and JA have implemented in the same platform (Intellij IDEA Community Edition 2020.2.3) using the same language (Java). …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
10
Automated surveillance in distributed, visual networks: an empirical comparison of recent algorithms
Published 2014“…A distributed network of wireless visual sensors was simulated using a number of high-resolution webcams setup in the hallways of an academic building. …”
Get full text
Get full text
Get full text
Article -
11
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
12
Visual codebook analysis in image understanding / Hoo Wai Lam
Published 2015“…Visual codebook, that act as a ‘dictionary’ for images, has been widely used in the literature. …”
Get full text
Get full text
Thesis -
13
-
14
Autonomous Target Tracking Of A Quadrotor UAV Using Monocular Visual-Inertial Odometry
Published 2018“…Referring to and improving the state-of-the-art CV algorithms, there is a newly formulated approach to detect the designed visual marker. …”
Get full text
Get full text
Monograph -
15
Parallel Implementation Of Field Visualizations With High Order Tetrahedral Finite Elements
Published 2013“…By using Red Partitioning of high order elements, the implemented algorithm successfully enables visualization of up to fourth order tetrahedra while using the same data structure for second order tetrahedra as available in ParaView. …”
Get full text
Get full text
Thesis -
16
Visual Public-Key Cryptosystems.
Published 2012“…Visual cryptography is special because the scheme requires visual inspection or the equivalence of simple Boolean computation and therefore, does not require complex computations.…”
Get full text
Get full text
Monograph -
17
A New Visual Public-Key Cryptosystem Based On Non-Expansion Technique And Boolean Operations
Published 2011“…The basic design of visual cryptography exploits the human visual system, to recover secret images. …”
Get full text
Get full text
Thesis -
18
Graphics, audio-visuals and interaction (GAI) based augmented reality (AR) system for symbian and android smartphone
Published 2012“…Audio video API of Symbian and Android were used to build the GAI based audio video module. Color picking algorithm was used to build the interactions module. …”
Get full text
Get full text
Get full text
Thesis -
19
A new image scrambling technique using block rotation algorithm based on Rubik’s cube
Published 2013“…The first part of the algorithm aims to build a rotation table using hash function within scramble phase and descramble phase to generate a scrambled (rotated) image and the retrieved image. …”
Get full text
Get full text
Get full text
Article -
20
Investigation and analysis of crack detection using UAV and CNN: A case study of Hospital Raja Permaisuri Bainun
Published 2023“…Automated crack detection using Machine Learning Algorithms (MLA), especially a Conventional Neural Network (CNN), along with an Unmanned Aerial Vehicle (UAV), can be effective and both can efficiently work together to detect the cracks in buildings using image processing techniques. …”
Get full text
Get full text
Get full text
Article
