Search Results - (( java implementation some algorithm ) OR ( pattern evaluation based algorithm ))
Search alternatives:
- java implementation »
- implementation some »
- pattern evaluation »
- evaluation based »
- some algorithm »
-
1
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
2
-
3
Route Optimization System
Published 2005“…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
Get full text
Get full text
Final Year Project -
4
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…It is shown that the implementation of AES encryption algorithm is capable to secure data stored in HDFS to some extent.…”
Get full text
Get full text
Conference or Workshop Item -
5
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…It is shown that the implementation of AES encryption algorithm is capable to secure data stored in HDFS to some extent.…”
Get full text
Get full text
Conference or Workshop Item -
6
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
7
A modified fuzzy min-max neural network with a genetic-algorithm-based rule extractor for pattern classification
Published 2010“…The first stage consists of a modified fuzzy min-max (FMM) neural-network-based pattern classifier, while the second stage consists of a genetic-algorithm (GA)-based rule extractor. …”
Get full text
Article -
8
Fuzzy modeling using Bat Algorithm optimization for classification
Published 2018“…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
9
IncSPADE: An Incremental Sequential Pattern Mining Algorithm Based on SPADE Property
Published 2016Get full text
Get full text
Get full text
Book Chapter -
10
An expanded square pattern technique in swarm of quadcopters for exploration algorithm
Published 2017“…We simulate the swarm-based exploration algorithm with expanded square pattern using a VREP simulator. …”
Get full text
Get full text
Get full text
Get full text
Article -
11
Implementation of RIO in UMJaNetSim / Chan Chin We
Published 2004“…In this project, I will do some research on the recent TCP congestion control and avoidance mechanisms and implement one of the mechanisms into the Java Network Simulator (JaNetSim). …”
Get full text
Get full text
Thesis -
12
Comparison of performances of Jaya Algorithm and Cuckoo Search algorithm using benchmark functions
Published 2022“…This paper aims to compare the performance of two metaheuristic algorithms which are Jaya Algorithm (JA) and Cuckoo Search (CS) using some common benchmark functions. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
Clustering ensemble learning method based on incremental genetic algorithms
Published 2012“…In the first and second phases, a threshold fuzzy c-means clustering algorithm as a clusterer and a pattern ensemble learning method based on the incremental genetic-based algorithms are proposed respectively. …”
Get full text
Get full text
Thesis -
14
Text searching algorithm using boyer moore horspool (BMH) algorithm
Published 2015“…Based on the study, the average analysis result for this algorithm is 93% which is a strong match.…”
Get full text
Get full text
Undergraduates Project Papers -
15
Variable block based motion estimation using hexagon diamond full search algorithm (HDFSA) via block subtraction technique
Published 2015“…In the video and frame selection, pre-defined video which have different type of motion and size is used for the algorithm evaluation purpose. The threshold calculation is based on the video selected. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
16
Statistical computing for forensic firearm pattern identification: Evaluating a fisher linear discriminant analysis-based algorithm against fixed-impulse noise
Published 2025“…This study evaluates the robustness of the FLDA-based ballistic identification algorithm against fixed-value impulse noise, including pepper, salt, and salt-and-pepper noise. …”
Get full text
Get full text
Get full text
Article -
17
Development of a new robust hybrid automata algorithm based on surface electromyography (SEMG) signal for instrumented wheelchair control
Published 2020“…Addition of hybrid automata algorithm to run pattern and non-pattern recognition based control methods is an advantage to increase accuracy in differentiating forward stroke or hand return activity. …”
Get full text
Get full text
Thesis -
18
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
Get full text
Get full text
Thesis -
19
Realization Of The 1D Local Binary Pattern (LBP) Algorithm In Raspberry Pi For Iris Classification Using K-NN Classifier
Published 2018“…Secondly, the K-NN classifier is used to classify the 1D-LBP based features from the first stage. There are two methods to evaluate the features, which are one versus one and one versus many. …”
Get full text
Get full text
Monograph -
20
Prime-based method for interactive mining of frequent patterns
Published 2010“…Over the past decade, an increasing number of efficient mining algorithms have been proposed to mine the frequent patterns by satisfying a user specified threshold called minimum support (minsup). …”
Get full text
Get full text
Thesis
