Search Results - (( java pattern detection algorithm ) OR ( basic computer user algorithm ))
Search alternatives:
- pattern detection »
- basic computer »
- user algorithm »
- computer user »
- java »
-
1
Design Of Robot Motion Planning Algorithm For Wall Following Robot
Published 2006“…Computer B will send the data to the BASIC Stamp and the BASIC Stamp will check their program. …”
Get full text
Get full text
Monograph -
2
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Electing the best set of features will help to improve the classifier predictions in terms of the normal and abnormal pattern. The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
Get full text
Get full text
Thesis -
3
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…For example,the spammer changes patterns of message for making spam such as writing the message by JavaScript, using different advertising images and words to form features or attributes. …”
Get full text
Get full text
Thesis -
4
A dataglove hardware design and real-time sign gesture interpretation.
Published 2023Conference Paper -
5
Agent-based extraction algorithm for computational problem solving
Published 2015“…Four agents have been proposed as an agent based model for CPS, which are User_Agent, PAC_Agent, IPO_Agent and Algorithm_Agent. …”
Get full text
Get full text
Thesis -
6
-
7
-
8
Image clustering comparison of two color segmentation techniques
Published 2010“…The developed patterns are applied in the field of real-time analysis. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
Travelling Salesman Problem using Prim Algorithm in High Performance Computing
Published 2007“…This preliminary report emphasizes on the basic terms of the efficient job scheduling algorithm for traveling salesman problem in high performance computing. …”
Get full text
Get full text
Final Year Project -
10
Tensor-based Hidden Semi-Markov Model for CPSS user activity analysis and services
Published 2025“…These algorithms facilitate three computational subtasks of activity sequence probabilities, model parameter learning, and activity prediction. …”
Get full text
Get full text
Get full text
Article -
11
Computer Lab Timetabling Using Genetic Algorithm Case Study - Unit ICT
Published 2006“…The prototype suggested several feasible solutions to the user.…”
Get full text
Get full text
Thesis -
12
Designing and implementation of robot mapping algorithm for mobile robot
Published 2014Get full text
Get full text
Get full text
Proceeding Paper -
13
Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun
Published 2000Get full text
Get full text
Thesis -
14
-
15
Website assurance monitoring application with MD5 Hashing and SHA-26 Algorithm / Abdullah Sani Abd Rahman and Samsiah Ahmad
Published 2022“…The Website Assurance Monitoring application has been developed based on MD5 hashing technique and SHA26 algorithm. By using Microsoft Visual Basic 6.0, the Graphical User Interfaces (GUIs) of the application to provide an easy or user-friendly monitoring application. …”
Get full text
Get full text
Get full text
Article -
16
T-way testing : a test case generator based on melody search algorithm
Published 2015Get full text
Get full text
Undergraduates Project Papers -
17
-
18
Scheduling of batch process plant / Aladin Awang Hamat
Published 1999“…For analysis purposes, the computer can accept this environment. The application of Visual basic 6.0 software is introduced to run the system. …”
Get full text
Get full text
Thesis -
19
-
20
Indoor Location Sensing Using WLAN IEEE 802.11b
Published 2008Get full text
Get full text
Conference or Workshop Item
