Search Results - (( java implementation some algorithm ) OR ( using patterns based algorithm ))
Search alternatives:
- java implementation »
- implementation some »
- some algorithm »
- using patterns »
-
1
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
2
-
3
Route Optimization System
Published 2005“…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
Get full text
Get full text
Final Year Project -
4
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…It is shown that the implementation of AES encryption algorithm is capable to secure data stored in HDFS to some extent.…”
Get full text
Get full text
Conference or Workshop Item -
5
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…It is shown that the implementation of AES encryption algorithm is capable to secure data stored in HDFS to some extent.…”
Get full text
Get full text
Conference or Workshop Item -
6
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
7
Fuzzy modeling using Bat Algorithm optimization for classification
Published 2018“…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
8
Implementation of RIO in UMJaNetSim / Chan Chin We
Published 2004“…In this project, I will do some research on the recent TCP congestion control and avoidance mechanisms and implement one of the mechanisms into the Java Network Simulator (JaNetSim). …”
Get full text
Get full text
Thesis -
9
The swarm-based exploration algorithm with expanded circle pattern for searching activities
Published 2015“…In this paper, we propose an exploration algorithm using quadcopter in simulation to discover an unknown area that is based on the expanding circle pattern for searching activities. …”
Get full text
Get full text
Get full text
Article -
10
Comparison of performances of Jaya Algorithm and Cuckoo Search algorithm using benchmark functions
Published 2022“…This paper aims to compare the performance of two metaheuristic algorithms which are Jaya Algorithm (JA) and Cuckoo Search (CS) using some common benchmark functions. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Modifying iEclat algorithm for infrequent patterns mining
Published 2018“…This paper proposes an enhancement algorithm based on iEclat algorithms for mining infrequent pattern.…”
Get full text
Get full text
Conference or Workshop Item -
12
Hexagon pattern particle swarm optimization based block matching algorithm for motion estimation / Siti Eshah Che Osman
Published 2019“…In this study, a pattern based using Particle Swarm Optimization (PSO) is proposed named as Hexagon PSO (HPSO). …”
Get full text
Get full text
Thesis -
13
Abnormal Pattern Detection In Ppg Signals Using Time Series Analysis
Published 2022“…This project’s objectives are to implement rule-based algorithm method for abnormal pattern detection in PPG signals, and to investigate the accuracy and performance of rule-based algorithm in detecting the abnormal pattern. …”
Get full text
Get full text
Undergraduates Project Papers -
14
-
15
Moiré Method Based Tilt Sensing System For Landslides Monitoring Using Raspberry PI
Published 2019“…The purpose of this research is to develop a tilt sensing device based on moiré fringe pattern theory for landslide monitoring using Raspberry Pi. …”
Get full text
Get full text
Monograph -
16
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
Get full text
Get full text
Thesis -
17
The Potential of a Classification-based Algorithm to Calculate Calories in Real-Time Via Pattern Recognition
Published 2016“…While the algorithm helped to classify different types of wavelengths produced from the sensor, a classification-based algorithm via Pattern Recognition Method will be used to classify and match the food components. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
Modifying iEclat algo ithm for infrequent patterns mining
Published 2018“…This paper proposes an enhancement algorithm based on iEclat algorithms for mining infrequent pattern.…”
Get full text
Get full text
Conference or Workshop Item -
19
An expanded square pattern technique in swarm of quadcopters for exploration algorithm
Published 2017“…We simulate the swarm-based exploration algorithm with expanded square pattern using a VREP simulator. …”
Get full text
Get full text
Get full text
Get full text
Article -
20
Using GA and KMP algorithm to implement an approach to learning through intelligent framework documentation
Published 2023“…Within the GA, nearest neighbor algorithm is used in determining the most similar recorded case that can be used in solving the new case. …”
Conference paper
