Search Results - (( java implementation learning algorithm ) OR ( program filing implementation algorithm ))
Search alternatives:
- implementation algorithm »
- implementation learning »
- filing implementation »
- java implementation »
- learning algorithm »
- program filing »
-
1
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
2
E-Raser: file shredder application with content replacement by using random words function
Published 2018“…Data shredding indicates a process of irreversible file destruction while file shredder is the program designed to render computer-based files unreadable by implementing overwriting method to destroy data in the content of a file. …”
Get full text
Get full text
Get full text
Article -
3
-
4
-
5
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…Therefore, the AES encryption algorithm has been implemented in HDFS to ensure the security of data stored in HDFS. …”
Get full text
Get full text
Conference or Workshop Item -
6
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…Therefore, the AES encryption algorithm has been implemented in HDFS to ensure the security of data stored in HDFS. …”
Get full text
Get full text
Conference or Workshop Item -
7
An Educational Tool Aimed at Learning Metaheuristics
Published 2020“…Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
Get full text
Get full text
Get full text
Thesis -
9
-
10
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
Get full text
Get full text
Get full text
Thesis -
11
A network based fetal ECG monitoring algorithm
Published 2011“…The AECG signal is processed into the remote computer terminal and finally extracts the FECG signal by the FHR monitoring program. The networking program is developed by a client/server approach and it can transport the AECG data file as well as online chatting facility. …”
Get full text
Get full text
Get full text
Article -
12
Effects of Authentication of Users in Mobile Internet Protocol Version 6
Published 2004“…Comparisons are done between systems implementing authentication and those that do not. The results show that the average delay is not much affected by the implementation of the program. …”
Get full text
Get full text
Thesis -
13
Vision-based robot indoor navigation
Published 2022“…NodeRed links both processing units together. An algorithm is developed in the computer to achieve image processing, user input, path planning, simulation, and writing of output files. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
14
Parallelization of speech compression based algorithm based on human auditory system on multicore system
Published 2012“…To achieve a scalable parallel speech coding algorithm, single program multiple data (SPMD) programming model was used, in which a single program was written for all cores. …”
Get full text
Get full text
Get full text
Article -
15
Songs Search Using Human Humming Voice
Published 2007“…Java programming language is used to build the system. The system has the functionality of humming voice recording and algorithms comparing both humming voice and song files in the system to fmd the right song. …”
Get full text
Get full text
Final Year Project -
16
Ciphercrypt-an Encryption System / Nor Hidayah Ngah
Published 2004“…This system is implemented on a Windows platform with Visual Basic as a programming language and 3-DES as a main encryption algorithm. …”
Get full text
Get full text
Thesis -
17
Challenges of hidden data in the unused area two within executable files
Published 2009“…The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
Get full text
Get full text
Get full text
Article -
18
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…We use a parallel technique that divides RSA power process into seperate threads and employs the use of Chinese Remainder Theorem (CRT) to decrease the time required for both encryption and decryption operation. Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
19
Experimental implementation controlled SPWM inverter based harmony search algorithm
Published 2023Article -
20
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis
