Search Results - (( program program detection algorithm ) OR ( java applications using algorithm ))
Search alternatives:
- applications using »
- program detection »
- java applications »
- using algorithm »
-
1
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
2
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013“…The performance of Java programming model and native programming model are compared with respect to the execution time for blood vessel detection. …”
Get full text
Get full text
Conference or Workshop Item -
3
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…The result shows that with native programming on Android platform, even a complicated object detection algorithm can be done in real-time.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Ultimately, the algorithm development program designed earlier is linked up directly to the robotic model for program implementation and verification. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Development of a cost efficient vision system for defects detection / Muhammad Zarif Kamarudin
Published 2010“…Programming software is required in order to execute the image acquisition and image analysis algorithm. …”
Get full text
Get full text
Monograph -
6
Development of cost efficient vision system for defects detection / Muhammad Zarif Kamarudin
Published 2010“…In this project, MATLAB platform is used to program the entire algorithm furthermore implementing Graphical User Interface to communicate between the vision system and the user. …”
Get full text
Get full text
Thesis -
7
An optimal mesh algorithm for remote protein homology detection
Published 2011“…This paper also shows that the use of the refinement algorithm increases the performance of the multiple alignments programs by at least 4%.…”
Get full text
Get full text
Article -
8
Multicolour object detection using multithreading
Published 2015“…The number of threads created in multithreading’s algorithm is depending on the number of colours to be detected. …”
Get full text
Get full text
Get full text
Proceeding Paper -
9
Early autism spectrum disorder detection using machine learning / Muhammad Shahmi Shahron Nizan
Published 2023“…The project follows a modified waterfall approach, focusing on creating a user-friendly interface and integrating the Random Forest Classification Algorithm for accurate detection. The results show the algorithm's impressive performance with an 86% precision in predicting ASD traits. …”
Get full text
Get full text
Thesis -
10
-
11
Charge-coupled device based on optical tomography system for monitoring two-phase flow
Published 2024Subjects:Article -
12
WURFL detection engine using cosine string similarity algortlhm / Illiasaak Ahmad ... [et al.]
Published 2013Get full text
Get full text
Research Reports -
13
-
14
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
15
Needleman wunsch implementation for SPAM/UCE inline filter
Published 2024Subjects:Conference Paper -
16
INTERFACING CMOS CAMERA WITH ARM MICROCONTROLLER FOR SMALL ROBOTIC PLATFORM
Published 2013“…The robot follows the object according to the algorithm that had been programmed. The heart of the system is Raspberry Pi. …”
Get full text
Get full text
Final Year Project -
17
-
18
Drone Based People Counter And Tracking Using Unique Id Using Opencv Python
Published 2020“…The algorithm is developed so that it is capable to detect various objects by applying a bounding box on the frame image. …”
Get full text
Get full text
Monograph -
19
-
20
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph
