Search Results - (( java implementation matching algorithm ) OR ( using code replication algorithm ))

  • Showing 1 - 8 results of 8
Refine Results
  1. 1

    Automatic Number Plate Recognition on android platform: With some Java code excerpts by ., Abdul Mutholib, Gunawan, Teddy Surya, Kartiwi, Mira

    Published 2016
    “…On the other hand, the traditional algorithm using template matching only obtained 83.65% recognition rate with 0.97 second processing time. …”
    Get full text
    Get full text
    Get full text
    Book
  2. 2

    Enhancing secure QR code steganography through artificial intelligence: a conceptual framework by Roslan, Nuur Alifah, Lydia, Maya Silvi, Gutub, Adnan

    Published 2025
    “…It is imperative to employ resilient QR code algorithms to guarantee the security of QR code applications in response to this challenge. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3
  4. 4
  5. 5

    Multi-floor indoor location estimation system based on wireless local area network by Chua, Tien Han

    Published 2007
    “…During location estimation, current histogram of RSS at unknown location will be compared to the database. The most probable match is selected and returned as estimated location based on Bayesian filtering algorithm. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Enhancing teaching and learning through data-driven optimization of servicing code demand and lecturer allocation using WEKA analysis by Rochin Demong, Nur Atiqah, Mohamed Razali, Murni Zarina, Kamaruddin, Juliana Noor, Shamsuddin, Sazwan, Awang, Nor Ain, Kamarudin, Norjuliatie, Wan Othman, Noor Faradilla

    Published 2025
    “…This study applies machine learning techniques using the WEKA analytical tool to explore, cluster and classify servicing code applications using a dataset gathered from multiple faculties, and campuses within the Faculty of Business and Management in a selected public university in Malaysia. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Efficient Malware Detection And Response Model Using Enhanced Parallel Deep Learning (EPDL-MDR) by Chowdhury Sajadul Islam

    Published 2026
    “…Malware, such as spyware, ransomware, and self-replicating worms, is designed to steal credentials and gain remote access while obfuscating its code to evade detection by traditional analysis systems. …”
    thesis::doctoral thesis
  8. 8

    An Agent-Based System with Personalization and Intelligent Assistance Services for Facilitating Knowledge Sharing by Mohd Sharef, Nurfadhlina

    Published 2006
    “…KSFaci is embedded in web environment and is implemented using Java Servlet and runs under Apache server. …”
    Get full text
    Get full text
    Thesis