Search Results - (( java implementation case algorithm ) OR ( pattern detection utilizing algorithm ))
Search alternatives:
- java implementation »
- implementation case »
- pattern detection »
- case algorithm »
-
1
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
2
-
3
Pairwise testing tools based on hill climbing algorithm (PTCA)
Published 2014“…The actual implementation of the algorithm which is in Java programming language, the program is implemented on Net Bean 7.0.1. …”
Get full text
Get full text
Undergraduates Project Papers -
4
Examination timetabling using genetic algorithm case study: KUiTTHO
Published 2005Get full text
Get full text
Thesis -
5
Java based expert system for selection of natural fibre composite materials
Published 2013“…In this paper, we develop a technology for the materials selection system using Java based expert system. The weighted-range method (WRM) was implemented to identify the range value and to scrutinise the candidate materials. …”
Get full text
Get full text
Get full text
Article -
6
Process fault detection and diagnosis using Boolean representation on fatty acid fractionation column
Published 2003“…Through the proposed algorithm, various faults could be simulated and detected using the system. …”
Get full text
Get full text
Conference or Workshop Item -
7
Enhanced grey wolf optimisation algorithm for feature selection in anomaly detection
Published 2022“…Thus, this study proposes an enhanced binary grey wolf optimiser (EBGWO) algorithm for FS in anomaly detection to overcome the algorithm issues. …”
Get full text
Get full text
Thesis -
8
-
9
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…According to the simulation results, the proposed algorithm produces the best solution among all algorithms in the proposed cases. � 2021 Little Lion Scientific…”
Review -
10
Circular discontinuities detection in welded joints using Circular Hough Transform
Published 2009Get full text
Article -
11
Concrete surface inspection by using unmanned aerial vehicle (UAV) and deep learning algorithms YOLOv7 / Saffa Nasuha Rusdinadi
Published 2024“…This research aims to improve the detection and analysis of cracks on concrete surfaces by utilizing UAVs and yolo algorithms. …”
Get full text
Get full text
Student Project -
12
EEG-based fatigue detection using binary pattern analysis and KNN algorithm
Published 2024Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
13
Comparison of performances of Jaya Algorithm and Cuckoo Search algorithm using benchmark functions
Published 2022“…CS and JA have implemented in the same platform (Intellij IDEA Community Edition 2020.2.3) using the same language (Java). …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Detection of in-car-abandoned children via deep learning algorithm / Mohd Farhan Mohd Pauzi
Published 2022“…This problem occurs due to lacking of existing system in detecting children image in a car. Therefore, this study aims to detect the existence of "in-car-abandoned children" using deep learning algorithm. …”
Get full text
Get full text
Thesis -
15
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
16
Detection of energy theft and defective smart meters in smart grids using linear regression
Published 2017“…In this paper, we design two linear regression-based algorithms to study consumers’ energy utilization behavior and evaluate their anomaly coefficients so as to combat energy theft caused by meter tampering and detect defective smart meters. …”
Get full text
Get full text
Article -
17
Optimizing the performance of mobile malware detection using the indexing rule
Published 2024journal::journal article -
18
Toward heterogeneous computing to facilitate sequential OLAP real-time applications
Published 2016“…The optimized algorithm is dedicated to detect patterns over parallel data streams in Real-Time. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
19
Ultra-wide band antipodal Vivaldi antenna design using target detection algorithm for detection application
Published 2023“…Furthermore, an algorithm for hidden target detection has been developed. …”
Get full text
Get full text
Get full text
Article -
20
Ultra-wide band antipodal Vivaldi antenna design using target detection algorithm for detection application
Published 2023“…Furthermore, an algorithm for hidden target detection has been developed. …”
Get full text
Get full text
Get full text
Article
