Search Results - (( java implementation case algorithm ) OR ( pattern detection during algorithm ))
Search alternatives:
- java implementation »
- implementation case »
- pattern detection »
- detection during »
- during algorithm »
- case algorithm »
-
1
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
2
Abnormal Pattern Detection In Ppg Signals Using Time Series Analysis
Published 2022“…This project’s objectives are to implement rule-based algorithm method for abnormal pattern detection in PPG signals, and to investigate the accuracy and performance of rule-based algorithm in detecting the abnormal pattern. …”
Get full text
Get full text
Undergraduates Project Papers -
3
An empirical study of pattern leakage impact during data preprocessing on machine learning-based intrusion detection models reliability
Published 2023“…In this paper, we investigate the impact of pattern leakage during data preprocessing on the reliability of Machine Learning (ML) based intrusion detection systems (IDS). …”
Get full text
Get full text
Article -
4
-
5
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Misuse detection algorithms model know attack behavior. They compare sensor data to attack patterns learned from the training data. …”
Get full text
Get full text
Thesis -
6
Pairwise testing tools based on hill climbing algorithm (PTCA)
Published 2014“…The actual implementation of the algorithm which is in Java programming language, the program is implemented on Net Bean 7.0.1. …”
Get full text
Get full text
Undergraduates Project Papers -
7
Examination timetabling using genetic algorithm case study: KUiTTHO
Published 2005Get full text
Get full text
Thesis -
8
A study on advanced statistical analysis for network anomaly detection
Published 2005“…Misuse detection algorithms model know attack behavior. They compare sensor data to attack patterns learned from the training data. …”
Get full text
Monograph -
9
Java based expert system for selection of natural fibre composite materials
Published 2013“…In this paper, we develop a technology for the materials selection system using Java based expert system. The weighted-range method (WRM) was implemented to identify the range value and to scrutinise the candidate materials. …”
Get full text
Get full text
Get full text
Article -
10
Anomaly detection through spatio-temporal context modeling in crowded scenes
Published 2014“…The proposed framework essentially turns the anomaly detection process into two parts, namely, motion pattern representation and crowded context modeling. …”
Get full text
Get full text
Conference or Workshop Item -
11
-
12
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…According to the simulation results, the proposed algorithm produces the best solution among all algorithms in the proposed cases. � 2021 Little Lion Scientific…”
Review -
13
Real-time measurement and gait detection algorithm for motion control of active ankle foot orthosis / Aminuddin Hamid
Published 2015“…This thesis proposes a real time gait phase detection system to control AAFO for rehabilitation and assist ankle motion. …”
Get full text
Get full text
Thesis -
14
Pengesanan minutiae imej cap jari berskala kelabu menggunakan algoritma susuran batas
Published 2002“…Even though, Wse minutiae still detected during the process. Based on these errors, an improved Ridge Line Following Algorithm has developed which consist of five processes; tangent direction computation, sectioning and maximum determination, end point detection, bifurcation point detection, and post-processing. …”
Get full text
Get full text
Thesis -
15
Comparison of performances of Jaya Algorithm and Cuckoo Search algorithm using benchmark functions
Published 2022“…CS and JA have implemented in the same platform (Intellij IDEA Community Edition 2020.2.3) using the same language (Java). …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
17
Mouth covered detection for yawn
Published 2013“…However, the spontaneous human action to cover the mouth during yawn can prevent such measurements. This paper presents a new technique to detect the covered mouth by employing the Local Binary Pattern (LBP) features. …”
Get full text
Get full text
Conference or Workshop Item -
18
-
19
An Improved Artificial Dendrite Cell Algorithm for Abnormal Signal Detection
Published 2018“…This causes the DCA fails to detect new data points if the pattern has distinct behavior from previous information and affects detection accuracy. …”
Get full text
Get full text
Article -
20
A novel peak detection algorithm using particle swarm optimization for chew count estimation of a contactless chewing detection
Published 2022“…This article uses a proximity sensor to perform noncontact-based (sensing) chewing activity detection, capturing the temporalis muscle movement during food intake. …”
Get full text
Get full text
Article
