Search Results - (( java implementation case algorithm ) OR ( sequence identification system algorithm ))
Search alternatives:
- sequence identification »
- identification system »
- java implementation »
- implementation case »
- system algorithm »
- case algorithm »
-
1
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
2
-
3
Enhancing counterfeit tag detection for RFID system using slotted aloha
Published 2021“…The track sequence number (TSN) was integrated with the time of arrival (TOA) at the detection stage to check the sequence process for the entire system from one stage to another, thus giving the system the capability to uniquely differentiate between counterfeit tag and the genuine tag. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
4
Parallel implementation of genomic sequences classification using modified gabor wavelet transform on multicore systems
Published 2012“…This paper presents the parallel implementation of the gene and exon identification of DNA sequences using the previously developed modified Gabor wavelet transform on multicore systems. …”
Get full text
Get full text
Proceeding Paper -
5
Pairwise testing tools based on hill climbing algorithm (PTCA)
Published 2014“…The actual implementation of the algorithm which is in Java programming language, the program is implemented on Net Bean 7.0.1. …”
Get full text
Get full text
Undergraduates Project Papers -
6
-
7
Examination timetabling using genetic algorithm case study: KUiTTHO
Published 2005Get full text
Get full text
Thesis -
8
Java based expert system for selection of natural fibre composite materials
Published 2013“…In this paper, we develop a technology for the materials selection system using Java based expert system. The weighted-range method (WRM) was implemented to identify the range value and to scrutinise the candidate materials. …”
Get full text
Get full text
Get full text
Article -
9
SYSTEM IDENTIFICATION AND MODEL PREDICTIVE CONTROL FOR INTERACTING SERIES PROCESS WITH NONLINEAR DYNAMICS
Published 2009“…Several important issues in the identification process and real-time implementation of model predictive control algorithm are also discussed. …”
Get full text
Get full text
Thesis -
10
-
11
-
12
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…According to the simulation results, the proposed algorithm produces the best solution among all algorithms in the proposed cases. � 2021 Little Lion Scientific…”
Review -
13
Fingerprint recognition system
Published 2005“…Fingerprint recognition is the oldest method which has been used in numerous applications for identification purpose in many social conditions such as access control and crime investigation.Now a day,in the era of technology the system is still using the password or smart card as an identity character for identification purpose.The problems happen when user forgot their password or lost their smart card. …”
Get full text
Get full text
Undergraduates Project Papers -
14
Kalman filter based impedance parameter estimation for transmission line and distribution line
Published 2019“…However, this is not true for certain low voltage systems or systems with short lines. In these cases, for transmission lines that are not fully transposed, the three sequence networks will be mutually coupled. …”
Get full text
Get full text
Thesis -
15
NARX modelling for steam distillation pilot plant using binary particle swarm optimisation technique / Najidah Hambali
Published 2019“…A system identification in control engineering field is a mathematical model based on dynamic properties of the system. …”
Get full text
Get full text
Thesis -
16
Comparison of performances of Jaya Algorithm and Cuckoo Search algorithm using benchmark functions
Published 2022“…CS and JA have implemented in the same platform (Intellij IDEA Community Edition 2020.2.3) using the same language (Java). …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
18
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
19
-
20
Genome-wide computational identification of biologically significant cis-regulatory elements and associated transcription factors from rice
Published 2019“…In this study, we tested the applicability of two algorithms developed for other model systems for the identification of biologically significant CREs of co-expressed genes from rice. …”
Get full text
Get full text
Get full text
Article
