Search Results - (( basic generation matching algorithm ) OR ( java implementation learning algorithm ))
Search alternatives:
- implementation learning »
- generation matching »
- java implementation »
- learning algorithm »
- basic generation »
-
1
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
2
Instance matching framework for heterogeneous semantic web content over linked data environment
Published 2021“…These frameworks suffer a high amount of comparisons in discovering matching attributes at initial stage which leads to missing attributes in generating training samples, thus results to incomplete alignment generation as matching output. …”
Get full text
Get full text
Thesis -
3
A fuzzy case-based reasoning model for software requirements specifications quality assessment
Published 2023“…The fuzzy Logic technique works on the selected nearest cases and it utilizes similarity measurement methods to classify the cases into no-match, partial-match and complete-match cases. The features matching results assist the revised step of the CBR to generate a new solution. …”
Article -
4
An Educational Tool Aimed at Learning Metaheuristics
Published 2020“…Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
Get full text
Get full text
Get full text
Thesis -
6
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
Get full text
Get full text
Get full text
Thesis -
7
Face Detection System / Chan Beh Teng
Published 2004“…The method used for detecting face is a combination of color based technique and template matching. A gray-scale image is generated from the original input image. …”
Get full text
Get full text
Thesis -
8
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
9
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
10
Bottleneck adjacent matching heuristics for scheduling a re-entrant flow shop with dominant machine problem
Published 2009“…Third, bottleneck approach was utilised in the study and the analysis using Visual Basic macro programming indicated that this method produced good results. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
Design And Evaluation Of A Modified Csma/Cd Mac Protocol On Single-Channel Optical Local Area Network
Published 2003“…The algorithm was developed in Visual Basic 6.0v programming language. …”
Get full text
Get full text
Thesis -
12
Transcriptomic Study of Gracilaria Changii (Gracilariales, Rhodophyta) By Expressed Sequence Tags and Cdna Microarray Approach
Published 2009“…The putative identity of TUGs was identified by using Basic Local Alignment Search Tool X (BLASTX) algorithm and classified according to the functional groups in Kyoto Encyclopedia of Genes and Genomes (KEGG). …”
Get full text
Get full text
Thesis -
13
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
14
Fingerprint reconstruction based on improved directional image
Published 2005“…In the conventional approach, for instance, a low quality image will generate many artificial minutiaes which lead to errors in fingerprint matching. …”
Get full text
Get full text
Thesis -
15
Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform
Published 2009Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Gravitational energy harvesting system based on multistage braking technique for multilevel elevated car parking building
Published 2020“…Thirdly, modeling of electrical and mechanical parameters for the presented system such that the system performance matching the model, this process is performed by using a parameter optimization algorithm. …”
Get full text
Get full text
Thesis -
17
Fractal coding of bio-metric image for face authentication
Published 2021“…The thesis also compares the results of enough images of various sizes generated by the proposed algorithms with the results of other fractal coding methods to confirm the algorithms’ clarity, reliability and validity. …”
Get full text
Get full text
Thesis -
18
Particle-based perception of garment folding for robotic manipulation purposes
Published 2023Article -
19
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
20
Query proof structure caching for incremental evaluation of tabled prolog programs / Taher Muhammad Ali
Published 2013“…These mechanisms are pattern-matching, treebased data structuring and backtracking. …”
Get full text
Get full text
Get full text
Thesis
