Search Results - (( java implementation learning algorithm ) OR ( building visualization using algorithm ))
Search alternatives:
- implementation learning »
- building visualization »
- java implementation »
- learning algorithm »
- using algorithm »
-
1
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
2
An Educational Tool Aimed at Learning Metaheuristics
Published 2020“…Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
Get full text
Get full text
Get full text
Thesis -
4
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
Get full text
Get full text
Get full text
Thesis -
5
Automated surveillance in distributed, visual networks: an empirical comparison of recent algorithms
Published 2014“…A distributed network of wireless visual sensors was simulated using a number of high-resolution webcams setup in the hallways of an academic building. …”
Get full text
Get full text
Get full text
Article -
6
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
7
Visual codebook analysis in image understanding / Hoo Wai Lam
Published 2015“…Visual codebook, that act as a ‘dictionary’ for images, has been widely used in the literature. …”
Get full text
Get full text
Thesis -
8
-
9
Autonomous Target Tracking Of A Quadrotor UAV Using Monocular Visual-Inertial Odometry
Published 2018“…Referring to and improving the state-of-the-art CV algorithms, there is a newly formulated approach to detect the designed visual marker. …”
Get full text
Get full text
Monograph -
10
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
11
Parallel Implementation Of Field Visualizations With High Order Tetrahedral Finite Elements
Published 2013“…By using Red Partitioning of high order elements, the implemented algorithm successfully enables visualization of up to fourth order tetrahedra while using the same data structure for second order tetrahedra as available in ParaView. …”
Get full text
Get full text
Thesis -
12
Visual Public-Key Cryptosystems.
Published 2012“…Visual cryptography is special because the scheme requires visual inspection or the equivalence of simple Boolean computation and therefore, does not require complex computations.…”
Get full text
Get full text
Monograph -
13
A New Visual Public-Key Cryptosystem Based On Non-Expansion Technique And Boolean Operations
Published 2011“…The basic design of visual cryptography exploits the human visual system, to recover secret images. …”
Get full text
Get full text
Thesis -
14
Graphics, audio-visuals and interaction (GAI) based augmented reality (AR) system for symbian and android smartphone
Published 2012“…Audio video API of Symbian and Android were used to build the GAI based audio video module. Color picking algorithm was used to build the interactions module. …”
Get full text
Get full text
Get full text
Thesis -
15
A new image scrambling technique using block rotation algorithm based on Rubik’s cube
Published 2013“…The first part of the algorithm aims to build a rotation table using hash function within scramble phase and descramble phase to generate a scrambled (rotated) image and the retrieved image. …”
Get full text
Get full text
Get full text
Article -
16
Investigation and analysis of crack detection using UAV and CNN: A case study of Hospital Raja Permaisuri Bainun
Published 2023“…Automated crack detection using Machine Learning Algorithms (MLA), especially a Conventional Neural Network (CNN), along with an Unmanned Aerial Vehicle (UAV), can be effective and both can efficiently work together to detect the cracks in buildings using image processing techniques. …”
Get full text
Get full text
Get full text
Article -
17
Restaurant review system with data visualization and text search using TF-IDF algorithm / Syazwina Abd Hamid
Published 2020“…Visualizations used in the system are circular bar plot, word cloud and bar chart where each visualization conveys different purpose. …”
Get full text
Get full text
Thesis -
18
Lightweight spatial attentive network for vehicular visual odometry estimation in urban environments
Published 2022“…Traditional visual odometry algorithms require the careful fabrication of state-of-the-art building blocks based on geometry. …”
Get full text
Get full text
Article -
19
Lightweight spatial attentive network for vehicular visual odometry estimation in urban environments
Published 2022“…Traditional visual odometry algorithms require the careful fabrication of state-of-the-art building blocks based on geometry. …”
Get full text
Get full text
Article -
20
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise
