Search Results - (( java implementation from algorithm ) OR ( automatic identification issues algorithm ))
Search alternatives:
- identification issues »
- java implementation »
- implementation from »
- issues algorithm »
- from algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
-
3
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
4
Evolutionary Programming (EP) based technique for secure point identification with load shedding technique in power transmission / Abdul Rahman Minhat
Published 2008“…The study was initiated by the development of new algorithm for automatic voltage stability assessment (AVSA). …”
Get full text
Get full text
Thesis -
5
Feature extraction using active appearance model algorithm with Bayesian classification approach
Published 2013“…It directed towards the illumination-invariant automatic recognition of faces and analysis to improve face verification and identification performance.To compare with other feature extraction at the end of the study, an evaluation has been done with an existing face recognition system using AAM algorithm. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Study Of Modified Training Algorithm For Optimized Convergence Speed Of Neural Network
Published 2016“…First proposed algorithm is the combination of momentum algorithm with adaptive learning rate (ALR) algorithm, and second proposed algorithm is the combination of momentum algorithm with automatic learning rate selection (ALRS) algorithm. …”
Get full text
Get full text
Thesis -
7
A security payment model for financial payment using mykad
Published 2011“…ARSA will automatically change its security algorithm based on times and attacks. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter
Published 2019“…It does not consider the LACE algorithm implemented in huge number of server in one Cloud datacenter. …”
Get full text
Get full text
Thesis -
9
Gait identification and optimisation for amphi-underwater robot by using ant colony algorithm
Published 2019“…The performance of the algorithm showed that the execution time of ACO is more realistic. …”
Get full text
Get full text
Get full text
Get full text
Article -
10
RFID-enabled supply chain detection using clustering algorithms
Published 2015“…Hence, we applied cost algorithms to reduce false negative values.…”
Get full text
Get full text
Conference or Workshop Item -
11
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
12
Route Optimization System
Published 2005“…Using that process, we have settled on Java as our development platform as we found it able to both implement DA and the GIS component (map display and manipulation). …”
Get full text
Get full text
Final Year Project -
13
Embedded automated vision for double parking identification system
Published 2018“…A camera was utilized to acquire the image of a parking area, and the image was processed using Beaglebone Black processor. A computer vision algorithm was developed to process the image using background subtraction, region of interest identification, and color analysis. …”
Get full text
Get full text
Get full text
Get full text
Article -
14
Pipeline condition assessment by instantaneous frequency response over hydroinformatics based technique—An experimental and field analysis
Published 2021“…The results recommended NIKAZ as an automatic selector of IMF to increase the degree of automation of HHT technique, subsequently enhancing the detection and identification of water pipeline leakage.…”
Get full text
Get full text
Get full text
Article -
15
An approach for cross-site scripting detection and removal based on genetic algorithms.
Published 2014“…The proposed approach is, so far, only implemented and validated on Java-based Web applications, although it can be implemented in other programming languages with slight modifications. …”
Get full text
Get full text
Conference or Workshop Item -
16
A web-based implementation of k-means algorithms
Published 2022“…Firstly, k-luster could incorporate additional clustering algorithms, or even classification algorithms in the future. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
17
Network game (Literati) / Chung Mei Kuen
Published 2003“…It should be an interesting, time and value worth topic to research on. By using Java applet, it will give a good interactive response since it does not suffer from the delays or variability of bandwidth associated with network connection. …”
Get full text
Get full text
Thesis -
18
An Approach to Automatic Garbage Detection Framework Designing using CNN
“…This paper proposes a system for automatic detection of litter and garbage dumps in CCTV feeds with the help of deep learning implementations. …”
Get full text
Get full text
Article -
19
An Approach to Automatic Garbage Detection Framework Designing using CNN
Published 2023“…This paper proposes a system for automatic detection of litter and garbage dumps in CCTV feeds with the help of deep learning implementations. …”
Get full text
Get full text
Article -
20
An Approach to Automatic Garbage Detection Framework Designing using CNN
Published 2023“…—This paper proposes a system for automatic detection of litter and garbage dumps in CCTV feeds with the help of deep learning implementations. …”
Get full text
Get full text
Article
