Search Results - (( developing affecting detection algorithm ) OR ( java implementation learning algorithm ))
Search alternatives:
- implementation learning »
- developing affecting »
- affecting detection »
- java implementation »
- learning algorithm »
-
1
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
2
An Educational Tool Aimed at Learning Metaheuristics
Published 2020“…Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
Get full text
Get full text
Get full text
Thesis -
4
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
Get full text
Get full text
Get full text
Thesis -
5
Missing tags detection algorithm for radio frequency identification (RFID) data stream
Published 2019“…Thus in this research, an AC complement algorithm with hashing algorithm and Detect False Negative Read algorithm (DFR) is used to developed the Missing Tags Detection Algorithm (MTDA). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
6
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
7
-
8
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
9
Investigation And Development Of Flattening Algorithms For Curved Latent Fingerprint Images
Published 2015“…Algorithm that applies ellipse approximation provides better performance as compared with the algorithm that developed based on parabolic approximation. …”
Get full text
Get full text
Thesis -
10
Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems
Published 2022“…Most of the currently existing intrusion detection systems (IDS) use machine learning algorithms to detect network intrusion. …”
Get full text
Get full text
Thesis -
11
Improved TLBO-JAYA Algorithm for Subset Feature Selection and Parameter Optimisation in Intrusion Detection System
Published 2020“…Many optimisation-based intrusion detection algorithms have been developed and are widely used for intrusion identification. …”
Get full text
Get full text
Get full text
Article -
12
Amplitude independent muscle activity detection algorithm of soft robotic glove system for hemiparesis stroke patients using single sEMG channel
Published 2020“…Many algorithms have been developed in the literature to detect muscle activities; however, most of these algorithms depend on amplitude features in the detection process. …”
Get full text
Get full text
Thesis -
13
Development of automatic pest sampling and detection system for cash crops
Published 2019“…Connected components algorithm was implemented for insect detection and counting. …”
Get full text
Get full text
Thesis -
14
-
15
Minimization of Test Cases and Fault Detection Effectiveness Improvement through Modified Reduction with Selective Redundancy Algorithm
Published 2007“…The results show the algorithm used in this research can reduce the test suite size as well as significantly improve the fault detection effectiveness. …”
Get full text
Get full text
Thesis -
16
Focal and non-focal epilepsy localization: a review
Published 2018“…This study reviews many recently-proposed algorithms for detecting the focal epileptic seizures. …”
Get full text
Get full text
Get full text
Article -
17
Polymorphic malware detection based on dynamic analysis and supervised machine learning / Nur Syuhada Selamat
Published 2021“…It also caused many protections are developed to fight the malware. The most common method of detecting malware relies on signature-based detection. …”
Get full text
Get full text
Thesis -
18
Ulcer detection and classification of wireless capsule endoscopy images using RGB masking
Published 2016“…This research aims to develop an algorithm to enhance wireless capsule endoscopy images and analyses them to detect Ulcer located in small intestine. …”
Get full text
Get full text
Article -
19
Ulcer detection and classification of wireless capsule endoscopy images using RGB masking
Published 2016“…This research aims to develop an algorithm to enhance wireless capsule endoscopy images and analyses them to detect Ulcer located in small intestine. …”
Get full text
Get full text
Article -
20
An Innovative Signal Detection Algorithm in Facilitating the Cognitive Radio Functionality for Wireless Regional Area Network Using Singular Value Decomposition
Published 2011“…The detection algorithm was developed analytically by applying the Signal Detection Theory (SDT) and the Random Matrix Theory (RMT). …”
Get full text
Get full text
Get full text
Thesis
