Search Results - (( based table using algorithm ) OR ( java implementation learning algorithm ))
Search alternatives:
- implementation learning »
- java implementation »
- learning algorithm »
- using algorithm »
- based table »
-
1
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
2
Enhancement of {0, 1, 3}-NAF Recoding Algorithm using Block Method Technique for Elliptic Curve Cryptosystem
Published 2015“…The running time is used to measure the performance of the based and the proposed algorithm. …”
Get full text
Get full text
Thesis -
3
An Educational Tool Aimed at Learning Metaheuristics
Published 2020“…Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
Get full text
Get full text
Get full text
Thesis -
5
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
Get full text
Get full text
Get full text
Thesis -
6
Investigation of evolutionary multi-objective algorithms in solving view selection problem / Seyed Hamid Talebian
Published 2013“…The results of each query can be a logical table which is derived from the base tables. Such tables are called views in database terminology. …”
Get full text
Get full text
Thesis -
7
Performance of Ad-Hoc on-Demand Distance Vector Discovery Algorithms Based On Packet Lifetime
Published 2008“…The first algorithm focuses on the AODV route table update management. …”
Get full text
Get full text
Thesis -
8
NIS-Apriori-based rule generation with three-way decisions and its application system in SQL
Published 2020“…The NIS-Apriori algorithm is an adjusted Apriori algorithm that can handle such tables. …”
Get full text
Get full text
Article -
9
Design of nonlinear adaptive interaction algorithm controller for improvement of tracking performance of X-Y table ball screw drive system
Published 2023“…Secondly is to design a new control strategy that will provide good tracking performance of the XY table. The final objective is to validate the proposed technique through simulation using MATLAB/Simulink software and experimental work using real plant of Googoltech XY table. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
JPEG Image Encryption Using Combined Reversed And Normal Direction-Distorted Dc Permutation With Key Scheduling Algorithm-Based Permutation
Published 2008“…The proposed approach uses a frequency domain combinational framework of coefficients scrambling with Key Scheduling Algorithm based (KSA-based) permutation. …”
Get full text
Get full text
Thesis -
11
Pixel-based skin color detection technique
Published 2005“…The histogram-based algorithm used here is referred to as the lookup table (LUT) and is adopted to identify those intervals which may fall in the skin locus plane. …”
Get full text
Get full text
Get full text
Article -
12
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
13
-
14
A cylindrical coordinate system with dynamic permutation table for blowfish algorithm
Published 2014“…The Blowfish Algorithm (BA) is a symmetric block cipher that iterates simple encryption and decryption functions by using Feistel networks.BA keys vary from 32-448 bits to ensure a high level of security.However, the BA requires a high memory percentage and it has a problem regarding randomness of output with text and image files having large strings of identical bytes.One solution to the seissues is to design a new Cryptography algorithm based on the BA that incorporates an F-function into a Cylindrical Coordinate System (CCS).The resulting F-function is known as a CCS with a Dynamic Permutation Table (DPT) or CCSDPT whereas the new algorithm is called the New BA (NBA).The objectives of the CCSDPT are to reduce memory requirements, enhance the randomness of the output and increase resistance to attacks through byte relocation and transformation in the right cylinder.NBA is evaluated by investigates the output of the algorithm by using statistical tests from the National Institute of Standard and Technology (NIST) with five types of data and compared with the BA.The findings of the NIST tests show that the NBA is suitable for any data stream, even those with long strings of identical bytes. …”
Get full text
Get full text
Get full text
Article -
15
An evolutionary based features construction methods for data summarization approach
Published 2015“…The DARA algorithm will be applied to summarize data stored in the non-target tables by clustering them into groups, where multiple records stored in nontarget tables correspond to a single record i,tored in a target table. …”
Get full text
Get full text
Research Report -
16
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
17
-
18
-
19
An ensemble data summarization approach based on feature transformation to learning relational data
Published 2015“…A ensemble clustering is designed, used and evaluated to generate the final classification framework that will take all input generated from the GA based clustering with Feature Selection and Feature Construction algorithms and perform the classification task for the relational datasets. …”
Get full text
Get full text
Get full text
Thesis -
20
Design and implementation of cordic algorithm with sinusoidal pulse width modulation switching strategy
Published 2017“…This design presents the uses of sinusoidal pulse width modulation (SPWM) as a switching control for multilevel inverter by using CORDIC algorithm. …”
Get full text
Get full text
Student Project
