Search Results - (( basic recent selection algorithm ) OR ( java implementation learning algorithm ))
Search alternatives:
- implementation learning »
- selection algorithm »
- java implementation »
- learning algorithm »
- recent selection »
- basic recent »
-
1
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
2
An Educational Tool Aimed at Learning Metaheuristics
Published 2020“…Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
Get full text
Get full text
Get full text
Thesis -
4
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
Get full text
Get full text
Get full text
Thesis -
5
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
6
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
7
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
8
An application of barnacles mating optimizer algorithm for combined economic and emission dispatch solution
Published 2021Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
-
10
Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform
Published 2009Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Recent Advances in Classification of Brain Tumor from MR Images – State of the Art Review from 2017 to 2021
Published 2022“…In addition, the review paper will facilitate researchers who are new to machine learning algorithms for brain tumor recognition to understand the basics of the field and pave the way for them to be able to contribute to this vital field of medical research. …”
Get full text
Get full text
Get full text
Article -
12
A phonetically rich and balanced lexical corpus using zipfian distribution for an under resourced language / Aminath Farshana
Published 2018“…In recent times, speech technology and its related applications are becoming a popular topic among researchers. …”
Get full text
Get full text
Get full text
Thesis -
13
Vision Based Calibration and Localization Technique for Video Sensor Networks
Published 2009“…The literature is replete with many localization and calibration algorithms that basically rely on some a-priori chosen nodes, called seeds, with known coordinates to help determine the network topology. …”
Get full text
Get full text
Thesis -
14
Fingerprint Image Compression Using Wavelet Transform
Published 2003“…Digital image compression based on the ideas of subband decomposition or discrete wavelet transform (DWT) has received much attention in recent years. In fact, wavelet refers to a set of basic function, which is recursively defined form, a set of scaling coefficients and scaling function. …”
Get full text
Get full text
Thesis -
15
Comparative study of 3D reconstruction methods from 2D sequential images in sports
Published 2020“…The process of 3D reconstruction is a basic problem in Computer Vision. However, recent researches have been successfully addressed by motion capture systems with body worn markers and multiple cameras. …”
Get full text
Get full text
Get full text
Article -
16
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
17
Nomadic people optimizer (NPO) for large-scale optimization problems
Published 2019“…The basic component of the algorithm consists of several clans and each clan searches for the best place (or best solution) based on the position of their leader. …”
Get full text
Get full text
Thesis -
18
A Survey Of Supervised Machine Learning In Wireless Sensor Network: A Power Management Perspective
Published 2013“…This mechanism increases the life of the node and of the overall network. In the recent era, researchers used different routing algorithms to decrease the power consumption in order to increase the wireless sensor network life. …”
Get full text
Get full text
Conference or Workshop Item -
19
Hybridflood algorithms minimizing redundant messages and maximizing efficiency of search in unstructured P2P networks
Published 2012“…In the other word the algorithm improved unstructured P2P search's scalability, efficiency and reliability. …”
Get full text
Get full text
Thesis -
20
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
Get full text
Get full text
Article
