Search Results - (( basic using force algorithm ) OR ( java implementation learning algorithm ))
Search alternatives:
- implementation learning »
- java implementation »
- learning algorithm »
- force algorithm »
- basic using »
- using force »
-
1
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
2
An Educational Tool Aimed at Learning Metaheuristics
Published 2020“…Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
Get full text
Get full text
Get full text
Thesis -
4
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
Get full text
Get full text
Get full text
Thesis -
5
Design of nonlinear adaptive interaction algorithm controller for improvement of tracking performance of X-Y table ball screw drive system
Published 2023“…The controller is developed based on the enhancement and modification of the basic Adaptive Interaction Algorithm Controller (AIA). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
6
Automatic prehension using an accelerometer and force sensor
Published 2005“…Having the necessary components identified, built and tested, the apparatus can be used to investigate automatic control algorithms for secure grips on objects.…”
Get full text
Get full text
Conference or Workshop Item -
7
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
8
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
9
Optical tactile sensor for robotic assisted surface characterization / Amir Abd Latif
Published 2016“…The forces were calibrated by analysing the captured deformation image of the silicone tactile sensor inner dome using camera, fibre-scope and light source. …”
Get full text
Get full text
Thesis -
10
Integrating fuzzy logic and brute force algorithm in optimizing energy management systems for battery electric vehicles
Published 2023“…This research proposes a solution to achieve more efficient control of HVAC consumption by integrating fuzzy logic techniques with brute-force algorithms to optimize the Energy Management System (EMS) in BEVs. …”
Get full text
Get full text
Get full text
Article -
11
Comparison between Lamarckian Evolution and Baldwin Evolution of neural network
Published 2006“…There are two basic strategies in using hybrid GAs, Lamarckian and Baldwinian evolution. …”
Get full text
Get full text
Get full text
Article -
12
Integrating fuzzy logic and brute force algorithm in optimizing Energy Management Systems for Battery Electric Vehicles
Published 2024“…This research proposes a solution to achieve more efficient control of HVAC consumption by integrating fuzzy logic techniques with brute-force algorithms to optimize the Energy Management System (EMS) in BEVs. …”
Get full text
Get full text
Get full text
Article -
13
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
14
Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform
Published 2009Get full text
Get full text
Get full text
Conference or Workshop Item -
15
On spectral efficiency maximization in a partial joint processing system using a multi-start particle swarm optimization algorithm
Published 2015“…However, achieving equivalent backhaul reduction based on limited feedback channel state information is challenging when linear techniques, such as zero-forcing beamforming (BF) are used, which led to the use of stochastic algorithms instead. …”
Get full text
Get full text
Conference or Workshop Item -
16
-
17
Optimization and prediction of battery electric vehicle driving range using adaptive fuzzy technique
Published 2022“…The study also developed an algorithm for predictive EMS using fuzzy model predictive control technique based on regression algorithm. …”
Get full text
Get full text
Thesis -
18
-
19
Proposed fatigue index for the objective detection of muscle fatigue using surface electromyography and a double-step binary classifier
Published 2022“…This paper presents an algorithm that employs a new fatigue index for the objective detection of muscle fatigue using a double-step binary classifier. …”
Get full text
Get full text
Article -
20
A New Visual Public-Key Cryptosystem Based On Non-Expansion Technique And Boolean Operations
Published 2011“…However, most of the existing public-key algorithms are based on complex mathematical computations. …”
Get full text
Get full text
Thesis
