Search Results - (( data validating site algorithm ) OR ( java implementation learning algorithm ))
Search alternatives:
- implementation learning »
- java implementation »
- learning algorithm »
- site algorithm »
- validating »
-
1
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
2
An Educational Tool Aimed at Learning Metaheuristics
Published 2020“…Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
Get full text
Get full text
Get full text
Thesis -
4
Hybrid Spatial-Artificial Intelligence Approach for Renewable Energy Sources Sites Identification and Integration in Sarawak State
Published 2022“…From this, the spatial criteria scheme data is produced. The MCDM-AHP algorithm is applied to the criteria scheme data to identify the number of RES sites. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
5
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
Get full text
Get full text
Get full text
Thesis -
6
A Framework for Green Energy Resources Identification and Integration Supported by Real-Time Monitoring, Control, and Automation Applications
Published 2025“…The first layer identified 23 optimal wind energy sites and 138 optimal hydro energy sites. The second layer employed spatial data and the fuzzy Technique for Order Preference by Similarity to Ideal Solution algorithm to refine potential solar energy sites, yielding the top 100 optimal locations. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
8
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
9
Advanced data mining techniques for landslide susceptibility mapping
Published 2021“…Simultaneously, the traditional algorithm is also useful and remains relevant, especially with similar site conditions. …”
Get full text
Get full text
Article -
10
Optimized techniques for landslide detection and characteristics using LiDAR data
Published 2018“…The performance of the outcome was validated based on the receiver operating characteristic (ROC) area under the curve (AUC) values, confusion matrix and Cross Validation method. …”
Get full text
Get full text
Get full text
Thesis -
11
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
12
Integration of object-based image analysis and data mining techniques for detailes urban mapping using remote sensing
Published 2015“…Overall accuracies of 88.05% and 87.78% were achieved for the first and second study sites, respectively. In the second case, available training data from the first study site were used to conduct the DM task. …”
Get full text
Get full text
Thesis -
13
Deriving global and local integrity rules for a distributed database
Published 2001“…In this paper, we describe an enforcement algorithm based on the rule mechanisms for a distributed database which aims at minimising the amount of data that has to be accessed or transferred across the underlying network by maintaining the consistency of the database at a single site, i.e. at the site where the update is to be performed. …”
Get full text
Get full text
Get full text
Article -
14
Abnormalities and fraud electric meter detection using hybrid support vector machine & genetic algorithm
Published 2023“…It provides an increased convergence and globally optimized solutions. The algorithm has been tested using actual customer consumption data from SESB. 10 fold cross validation method is used to confirm the consistency of the detection accuracy. …”
Conference Paper -
15
Modeling flood occurences using soft computing technique in southern strip of Caspian Sea Watershed
Published 2012“…This area contains 604 pairs of observed data which was grouped into 60%, 20% and 20% for training, validation and testing, respectively. …”
Get full text
Get full text
Thesis -
16
Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform
Published 2009Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Early tube leak detection system for steam boiler at KEV power plant
Published 2023Conference Paper -
18
A comparative effectiveness of hierarchical and non-hierarchical regionalisation algorithms in regionalising the homogeneous rainfall regions
Published 2022“…Descriptive data mining has been widely applied in hydrology as the regionalisation algorithms to identify the statistically homogeneous rainfall regions. …”
Get full text
Get full text
Get full text
Article -
19
A comparative effectiveness of hierarchical and nonhierarchical regionalisation algorithms in regionalising the homogeneous rainfall regions
Published 2022“…Descriptive data mining has been widely applied in hydrology as the regionalisation algorithms to identify the statistically homogeneous rainfall regions. …”
Get full text
Get full text
Get full text
Article -
20
Construction Noise Prediction Using Stochastic Deep Learning
Published 2022“…The deep learning model was trained with stochastic data to predict the noise levels emitted from the construction site. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis
