Search Results - (( solution negative detection algorithm ) OR ( java implementation among algorithm ))
Search alternatives:
- implementation among »
- java implementation »
- negative detection »
- among algorithm »
-
1
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
2
Missing tags detection algorithm for radio frequency identification (RFID) data stream
Published 2019“…Thus in this research, an AC complement algorithm with hashing algorithm and Detect False Negative Read algorithm (DFR) is used to developed the Missing Tags Detection Algorithm (MTDA). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
3
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
4
A Toolkit for Simulation of Desktop Grid Environment
Published 2014“…A simulator for desktop grid environment has been developed using Java as the implementation language due to its wide popularity. …”
Get full text
Get full text
Final Year Project -
5
A study on the performances of danger theory and negative selection algorithms for mobile spam detection
Published 2024journal::journal article -
6
Haar cascade algorithm for microsleep detection
Published 2025“…Based on these results, future research should focus on enhancing the core algorithm to be more resilient to variable lighting and distance, thereby reducing false positives and negatives. …”
Get full text
Get full text
Article -
7
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…According to the simulation results, the proposed algorithm produces the best solution among all algorithms in the proposed cases. � 2021 Little Lion Scientific…”
Review -
8
Dyslexia handwriting detection using Convolutional Neural Network (CNN) algorithm / Sofea Najihah Mohd Zaki
Published 2024“…This project attempts to accurately detect the type of dyslexic handwriting. Convolutional Neural Network (CNN) algorithm was chosen as one of the possible solutions after a thorough analysis of many algorithms for dyslexic handwriting identification. …”
Get full text
Get full text
Thesis -
9
Network game (Literati) / Chung Mei Kuen
Published 2003“…The main aspect of this thesis is to produce a networked gaming system, which process players. requested to play the game and enabling users to play the graphical game with people through the network. The algorithm design and implementation method must not only be workable, but also highly efficient in terms of execution speed and response time. …”
Get full text
Get full text
Thesis -
10
Single Fitness Function to Optimize Energy using Genetic Algorithms for Wireless Sensor Network
Published 2024journal::journal article -
11
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…The simulation is implemented with iFogSim and java programming language. …”
Get full text
Get full text
Article -
12
Comparison of performances of Jaya Algorithm and Cuckoo Search algorithm using benchmark functions
Published 2022“…CS and JA have implemented in the same platform (Intellij IDEA Community Edition 2020.2.3) using the same language (Java). …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
Drowsiness detection and alert system using face recognition with Raspberry Pi / Nur Syazwina Mohd Fadzalisham, Nor Adora Endut and Muhammad Nizamuddin Rosli
Published 2023“…The solution integrates a Telegram bot for streamlined communication, utilizing PiCamera to capture facial photos and promptly detect signs of drowsiness. …”
Get full text
Get full text
Book Section -
14
Drowsiness detection and alert system using face recognition with Raspberry Pi / Nur Syazwina Mohd Fadzalisham, Nor Adora Endut and Muhammad Nizamuddin Rosli
Published 2023“…The solution integrates a Telegram bot for streamlined communication, utilizing Pi Camera to capture facial photos and promptly detect signs of drowsiness. …”
Get full text
Get full text
Book Section -
15
Smart Digital Signage With Eye Tracking System
Published 2017“…A sanity checking algorithm is proposed to filter out the wrong detected eyes and improve the overall detection rate. …”
Get full text
Get full text
Thesis -
16
Scrutinized System Calls Information Using J48 And Jrip For Malware Behaviour Detection
Published 2019“…However, such detection method still lacks in differentiate the malware behaviours and cause the rate of falsely identified rate, i.e., false positive and false negative increased. …”
Get full text
Get full text
Get full text
Article -
17
Embedded mini-analyzer device for in situ wide range heavy metal identification and concentration detection
Published 2018“…With the advancement of integrated technology, in-situ electrochemical systems provide feasible solution for sensitive detection and miniaturized platform. …”
Get full text
Get full text
Thesis -
18
An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach
Published 2015“…The effectiveness of the IADS has been evaluated under different detection capabilities (i.e., false positive, false negative, true positive, true negative, false alarm, accuracy,detection rate, attack data detection rate, normal data detection rate) and detection times using the DARPA 1999 and ISCX 2012 intrusion detection benchmark datasets as well as with Live-data. …”
Get full text
Get full text
Thesis -
19
Network monopoly / Tan Kean Yeap
Published 2002“…The main aspect of this thesis is to produce a network monopoly system, which process multiple game sessions concurrently, enabling users to play the graphical game with people within the network. The algorithm design and implementation method mustnot only be workable, but also highly efficient in terms of execution speed and respond time. …”
Get full text
Get full text
Thesis -
20
Coordinated Malware Eradication And Remediation Project (CMERP)
Published 2019“…However, such detection method still lack in differentiate the malwares behaviours and cause the rate of falsely identified rate i.e. false positive and false negative increased. …”
Get full text
Get full text
Get full text
Technical Report
