Search Results - (( based double using algorithm ) OR ( java implementation learning algorithm ))
Search alternatives:
- implementation learning »
- java implementation »
- learning algorithm »
- using algorithm »
- based double »
- double using »
-
1
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
2
Bilinear pairings computation using the extended double-base chains algorithm
Published 2010“…The computation efficiency of the Weil and Tate pairings mainly depends on the efficiency of the EC scalar multplications algorithms used. In this paper, we compute the Tate pairing using multi-base number representation(MBNR) system in scalar multiplication instead of using binary representation as used in Miller’s algorithm and in the double-base (DB) chain used by Changan Zhao et al. …”
Get full text
Get full text
Get full text
Article -
3
An Educational Tool Aimed at Learning Metaheuristics
Published 2020“…Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
Get full text
Get full text
Get full text
Thesis -
5
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
Get full text
Get full text
Get full text
Thesis -
6
Enhancing speed performance of the cryptographic algorithm based on the lucas sequence
Published 2003“…The computation time analysis shows that whene doubling with remainder technique is used, the improvement of the speed rises rapidly compared to the standard implementation of the LUC algorithm and LUC algorithm with doubling rule. …”
Get full text
Get full text
Thesis -
7
Augmented model based double iterative loop techniques for integrated system optimisation and parameter estimation of large scale industrial processes
Published 1993“…The methods incorporate integrated system optimisation and parameter estimation which utilizes process measurements to achieve real process optimality inspite of model reality differences. The double iterative loop structures of the proposed algorithms use the real process measurement within the outer loops while the inner loops involve model based computation only. …”
Get full text
Get full text
Article -
8
Optimization Of Double Layer Grid Structures Using FEM, SPSA And Neural Networks
Published 2012“…For this purpose, use of a gradient based optimization algorithm incorporating stochastic feature called static perturbation stochastic approximation (SPSA) has not investigated. …”
Get full text
Get full text
Thesis -
9
-
10
-
11
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
12
Enhanced scalar multiplication algorithm over prime field using elliptic net
Published 2024“…In this paper, a novel scalar multiplication algorithm based on the modified double and double add via elliptic net with Karatsuba method was proposed in order to enhance the efficiency of scalar multiplication. …”
Get full text
Get full text
Get full text
Article -
13
Multi-base number representation in application to scalar multiplication and pairing computation
Published 2011“…Multi-bases number representation is used to construct new versions of Miller’s algorithm. …”
Get full text
Get full text
Thesis -
14
Feature identification in a real surface metrology analysis by means of Double Iteration Sobel (DIS) / Ainaa Farhanah Mohd Razali
Published 2022“…The system algorithm is verified and validates on two sloped bumps surface topographies that have been simulated using MATLAB software and measured using the Alicona Infinite Focus Measurement (IFM) device, respectively. …”
Get full text
Get full text
Thesis -
15
Optimization Of Pid Controller For Double-Link Flexible Robotic Manipulator Using Metaheuristic Algorithms
Published 2019“…This paper investigates the optimization approach of PID controller for double-link flexible robotic manipulator using metaheuristic algorithm. …”
Get full text
Get full text
Get full text
Proceeding -
16
Modified multi-verse optimizer for nonlinear system identification of a double pendulum overhead crane
Published 2021“…This paper presents the identification of double pendulum overhead crane (DPOC) plant based on the hybrid Multi-Verse Optimizer with Sine Cosine Algorithm (HMVOSCA) using the continuous-time Hammerstein model. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
18
-
19
New signed-digit {0,1,3}-NAF scalar multiplication algorithm for elliptic curve over binary field
Published 2011“…The tripling operation is done by computing (2P+P) using one doubling followed by one mixed addition. …”
Get full text
Get full text
Thesis -
20
A new image encryption algorithm based on single S-box and dynamic encryption step
Published 2021“…This paper presents an efficient and secure chaotic-based S-box image encryption scheme. Firstly, a single S-box with a size of 10 × 26 was constructed by using a low-dimensional chaotic system. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Experiment
