Search Results - (( java application window algorithm ) OR ( _ validation using algorithm ))
Search alternatives:
- application window »
- java application »
- window algorithm »
- validation using »
- using algorithm »
-
1
Application-Programming Interface (API) for Song Recognition Systems
Published 2024“…In addition the implementation is done by algorithm using Java’s programming language, executed through an application developed in the Android operating system. …”
Article -
2
Face recognition and identification system (FaceRec) / Khew Jye Huei
Published 2004“…Face recognition is a technique to identify an individual by his/her physical characteristic and has been of interest to a growing number of researchers due to its applications on security. Several different algorithms have been proposed for computer recognition of human faces. …”
Get full text
Get full text
Thesis -
3
Enhance Luhn algorithm for validation of identity card numbers (ID card)
Published 2013“…The enhancement is expected to be useful for many sites that use the algorithm.…”
Get full text
Get full text
Get full text
Article -
4
Enhance luhn algorithm for validation of credit cards numbers.
Published 2013“…The Luhn algorithm is the first line of defense in many e-commerce sites and is used to validate a variety of identification numbers such as credit card numbers. …”
Get full text
Get full text
Get full text
Article -
5
Cluster validity of the fuzzy C-means algorithm in mammographic image using adaptive cluster & partition entropy indexes / Azwani Aziz
Published 2010“…This problem can be solved by cluster validity index. Cluster validity index is needed to find the suitable number of cluster, c in any fuzzy clustering algorithm. …”
Get full text
Get full text
Thesis -
6
-
7
Validation on an enhanced dendrite cell algorithm using statistical analysis
Published 2017“…This study demonstrates the mechanism of evaluating an enhanced algorithm using performance metrics and validated it using statistical analysis. …”
Get full text
Get full text
Get full text
Article -
8
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
9
Implementation of New Improved Round Robin (NIRR) CPU scheduling algorithm using discrete event simulation
Published 2015“…Round Robin scheduling algorithm is the most widely used scheduling algorithm because of its simplicity and fairness. …”
Get full text
Get full text
Thesis -
10
Implementation of New Improved Round Robin (NIRR) CPU scheduling algorithm using discrete event simulation
Published 2016“…Round Robin scheduling algorithm is the most widely used scheduling algorithm because of its simplicity and fairness [1]. …”
Get full text
Get full text
Get full text
Article -
11
Optimization of assembly line balancing with energy efficiency by using tiki-taka algorithm
Published 2023“…Lastly, a study of the industrial case was performed as a validation of the developed model and algorithm. An automotive company is selected, and the collected actual data is used for validation purposes. …”
Get full text
Get full text
Thesis -
12
Prediction of Machine Failure by Using Machine Learning Algorithm
Published 2019“…The columns consist of the variables that record the reading of machine sensor tags. Validation for the model is analyzed by using validation testing data and cross validation. …”
Get full text
Get full text
Final Year Project -
13
Key schedule algorithm based on coordinate geometry of a three-dimensional hybrid cube
Published 2019“…Therefore, it can be concluded that the strength and validity of KSAHC algorithm have been enhanced as compared to other algorithms and can serve as the alternative algorithm in designing security systems.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
14
System identification using Extended Kalman Filter
Published 2017“…In order to evaluate the performance of the EKF learning algorithm, the proposed algorithm validation were analyzed using model validation methods as a checker such as One Step Ahead (OSA) and correlation coefficient (R2). …”
Get full text
Get full text
Student Project -
15
Phylogenetic tree classification system using machine learning algorithm
Published 2015“…The leave-out one cross-validation was used to calculate the accuracy of each feature. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
16
A Test Vector Minimization Algorithm Based On Delta Debugging For Post-Silicon Validation Of Pcie Rootport
Published 2017“…However, manual debugging is still widely used in post-silicon validation and is a major bottleneck in the validation process. …”
Get full text
Get full text
Thesis -
17
Performance of Semi Active Lateral Control (SALC) algorithm for semi active suspension system in multibody co-simulation method / M. M. Abdul Majid ...[et al.]
Published 2018“…The experimental data used for simulation model correlation and validation. …”
Get full text
Get full text
Article -
18
Priority and dynamic quantum time algorithms for central processing unit scheduling
Published 2018“…Central Processing Unit is scheduled using different types of scheduling algorithms. One of the most widely algorithm used in scheduling with sharing and batch operating systems is Round Robin. …”
Get full text
Get full text
Thesis -
19
A case study of microarray breast cancer classification using machine learning algorithms with grid search cross validation
Published 2023“…Grid search cross validation (CV) is applied for hyperparameter tuning of the algorithms. …”
Get full text
Get full text
Get full text
Article -
20
Testing and validation of a Β; algorithm for cubesat satellites
Published 2016Get full text
Get full text
Get full text
Article
