Search Results - (( java implementation case algorithm ) OR ( pattern detection sample algorithm ))
Search alternatives:
- java implementation »
- implementation case »
- pattern detection »
- sample algorithm »
- case algorithm »
-
1
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
2
-
3
Pairwise testing tools based on hill climbing algorithm (PTCA)
Published 2014“…The actual implementation of the algorithm which is in Java programming language, the program is implemented on Net Bean 7.0.1. …”
Get full text
Get full text
Undergraduates Project Papers -
4
Examination timetabling using genetic algorithm case study: KUiTTHO
Published 2005Get full text
Get full text
Thesis -
5
Random Undersampling on Imbalance Time Series Data for Anomaly Detection
Published 2023Conference Paper -
6
Java based expert system for selection of natural fibre composite materials
Published 2013“…In this paper, we develop a technology for the materials selection system using Java based expert system. The weighted-range method (WRM) was implemented to identify the range value and to scrutinise the candidate materials. …”
Get full text
Get full text
Get full text
Article -
7
Cabbage disease detection system using k-NN algorithm
Published 2022“…It is a method of extracting second-order statistical texture features to detect diseases more efficiently. Finally, the KNN algorithm will be used to classify the disease based on sample nature and a cabbage disease data set. …”
Get full text
Get full text
Get full text
Academic Exercise -
8
-
9
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…According to the simulation results, the proposed algorithm produces the best solution among all algorithms in the proposed cases. � 2021 Little Lion Scientific…”
Review -
10
Alternate methods for anomaly detection in high-energy physics via semi-supervised learning
Published 2020“…We tested the algorithms’ capability to create distinct anomalous patterns in the presence of BSM samples and also compare their classification output metrics to the Isolation Forest (ISF), a well-known anomaly detection algorithm. …”
Get full text
Get full text
Get full text
Article -
11
Dyslexia handwriting detection using Convolutional Neural Network (CNN) algorithm / Sofea Najihah Mohd Zaki
Published 2024“…A user-friendly desktop prototype was developed, and users may upload handwritten samples and get immediate results for the dyslexia handwriting type (normal or reversal) and status of handwriting (detect or not detect). …”
Get full text
Get full text
Thesis -
12
Neural network algorithm development for Ion Sensitive Field Effect Transistor (ISFET) sensor / Muhammad Nasrul Hakim Adenan
Published 2013“…The ANN makes the model learn the pattern by the sample of inputs and outputs to estimate results or to get more accurate data. …”
Get full text
Get full text
Thesis -
13
Neural network algorithm development for Ion Sensitive Field Effect Transistor (ISFET) sensor: article / Muhammad Nasrul Hakim Adenan and Maizatul Zolkapli
Published 2013“…The ANN makes the model learn the pattern by the sample of inputs and outputs to estimate results or to get more accurate data. …”
Get full text
Get full text
Article -
14
Pattern Recognition for Human Diseases Classification in Spectral Analysis
Published 2022“…On the other hand, classification methods are techniques or algorithms used to group samples into a predetermined category. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
15
Comparison of performances of Jaya Algorithm and Cuckoo Search algorithm using benchmark functions
Published 2022“…CS and JA have implemented in the same platform (Intellij IDEA Community Edition 2020.2.3) using the same language (Java). …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
17
Circular discontinuities detection in welded joints using Circular Hough Transform
Published 2009Get full text
Article -
18
Environmental pollution monitoring: a novel vectorial algorithm technique for oil detection in wastewater
Published 2023“…It is found that the new algorithm is capable of detecting the presence of oil in water samples containing many other unknown polluting elements up to 0.1 mg/L. …”
Article -
19
Detection of in-car-abandoned children via deep learning algorithm / Mohd Farhan Mohd Pauzi
Published 2022“…This problem occurs due to lacking of existing system in detecting children image in a car. Therefore, this study aims to detect the existence of "in-car-abandoned children" using deep learning algorithm. …”
Get full text
Get full text
Thesis -
20
Two-factor authentication smart entryway using modified LBPH algorithm
Published 2024“…The system employs the Local Binary Patterns Histograms for the full face recognition algorithm and modified LBPH algorithm for occluded face detection. …”
Get full text
Get full text
Get full text
Article
