Search Results - (( based method pertaining algorithm ) OR ( java implementation learning algorithm ))
Search alternatives:
- implementation learning »
- pertaining algorithm »
- java implementation »
- learning algorithm »
- based method »
-
1
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
2
An Educational Tool Aimed at Learning Metaheuristics
Published 2020“…Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
Get full text
Get full text
Get full text
Thesis -
4
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
Get full text
Get full text
Get full text
Thesis -
5
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
6
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
7
An improved chaotic image encryption algorithm
Published 2018“…Chaotic-based image encryption algorithms are countless in number. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
8
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
9
An analysis of low complexity of 5G-MIMO communication system based CR using hybrid filter detection
Published 2022“…This recommended SS algorithm, based on the hybrid filter detection (HFD) method, employs the Cosine law for filtering the traffic signal, and then enables segmentation by applying the Welch algorithm. …”
Get full text
Get full text
Article -
10
Improved algorithms of elliptic curve point multiplication over binary and prime fields using elliptic net
Published 2022“…In this study, the proposed DBL and DBLADD algorithm using the Karatsuba method for non-supersingular Koblitz curve over m bits binary field with gcd(2m– 1, 3)=1 that incorporates eight blocks of EN with three temporary variables saved two multiplications or 9.09% in DBL and DBLADD algorithms, in comparison to the recent literature pertaining to EN. …”
Get full text
Get full text
Get full text
Thesis -
11
Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform
Published 2009Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Chronic kidney disease diagnostic tools based on machine learning algorithms: a review / Muhamad Huzaimi Abdul Ghafar ... [et al.]
Published 2025“…We conducted an extensive literature review, identifying 70 papers pertaining to ML-based CKD diagnostic tools recently published. …”
Get full text
Get full text
Get full text
Article -
13
MOTION TARGET TRACKING OF MOBILE ROBOTS
Published 2015“…The main hardware and has been tested with basic programs based on the algorithms of the said methods. Two-dimensional coordinate measurement and calibration has been achieved with varying degrees of accuracy depending upon the resolution selected for use on the camera. …”
Get full text
Get full text
Final Year Project -
14
A multi-nets ANN model for real-time performance-based automatic fault diagnosis of industrial gas turbine engines
Published 2017“…When a robust mathematical model of a process equipment is available, model-based diagnostic methods can be used to identify the occurrence of faults in a system. …”
Get full text
Get full text
Article -
15
Monotone Data Samples Do Not Always Produce Monotone Fuzzy If- Then Rules: Learning with Ad hoc and System Identification Methods
Published 2017“…Our analysis shows that even with multi-attribute monotone data, non-monotone fuzzy If- Then rules can be produced using an ad hoc method. The same observation can be made, empirically, using a system identification method, e.g., a derivative–based optimization method and the genetic algorithm. …”
Get full text
Get full text
Get full text
Article -
16
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
17
Protein secondary structure prediction from amino acid sequences using a neural network classifier based on the Dempster-Shafer theory
Published 2003“…In order to reduce the computational demand when training with large data of proteins, an interface was developed using the data parallel approach to parallelize the training phase of the classifier and other accompanying methods such as data clustering algorithms. The parallelized classifier also permitted rigorous experiments to be conducted in two other benchmark problems with disparate dimensions to determine the classifier's inherent attributes and drawbacks. …”
Get full text
Get full text
Thesis -
18
Design and Simulation on Compressor Metal Matrix Composite by Investment Casting
Published 2011“…This study presents the use of genetic algorithm (GA) and computer programs for designing a new compressor and determined the wax pattern dimensions based on three-dimensional finite-element simulations as a preliminary study by using investment casting method. …”
Get full text
Get full text
Article -
19
Penggunaan penyepadanan imej berdasarkan kawasan dalam fotogrametri jarak dekat bagi pengukuran permukaan struktur
Published 2006“…In civil engineering, web deformations of a structure, in particular steel, are useful indicators pertaining to its failure. Present laboratory methods employed in determining the web deformations are through the use of LVDT. …”
Get full text
Get full text
Thesis -
20
Quantitative spasticity assessment model of neurological disorder patients / AA Puzi … [et al.]
Published 2023“…Patients with neurological disorders usually experience conditions where their muscles are stiff, tight, and prone to resist upon stretching, which in essence defines muscle spasticity. The current method of muscle spasticity assessment is based on subjective assessment by therapists who rely on their inner intuition, experience, and skills that comply with the Modified Ashworth Scale tool. …”
Get full text
Get full text
Book Section
