Search Results - (( developing development intention algorithm ) OR ( java implementation learning algorithm ))
Search alternatives:
- implementation learning »
- development intention »
- intention algorithm »
- java implementation »
- learning algorithm »
-
1
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
2
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
3
An Educational Tool Aimed at Learning Metaheuristics
Published 2020“…Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
Get full text
Get full text
Get full text
Thesis -
5
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
Get full text
Get full text
Get full text
Thesis -
6
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
7
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
8
Intent-IQ: customer’s reviews intent recognition using random forest algorithm
Published 2025“…In order to overcome this problem, a classification model for intent recognition is developed. Dataset from Kaggle which contains English reviews from Shopee is downloaded to be used for the modelling process. …”
Get full text
Get full text
Get full text
Article -
9
Power system intentional islanding for different contingency scenarios using discrete optimization technique
Published 2023“…In addition, the results of the case studies (with critical line outage) showed that the MDEP algorithm was able to obtain the optimal intentional islanding strategy with minimal power flow disruption.…”
text::Thesis -
10
A recommender system approach for classifying user navigation patterns using longest common subsequence algorithm.
Published 2009“…In this paper, to provide online predicting effectively, we develop a model for online predicting through web usage mining system and propose a novel approach for classifying user navigation patterns to predict users’ future intentions. …”
Get full text
Get full text
Article -
11
The Development Of Planar Curves With High Aesthetic Value
Published 2010“…The pattern of research in this ¯eld of study has branched to ¯ve major groups; the devel- opment of fairing algorithms; the development of planar curves via curve synthesis, the development of algorithms to modify natural spirals to suit design intent, the modi¯cation of °exible curves (B¶ezier and NURBS) so that the curvature pro¯le is strictly monotonic and ¯nally, the development of algorithms to ¯t natural spirals and approximation via °exible curves.…”
Get full text
Get full text
Thesis -
12
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
13
-
14
The application of neural networks and min-max algorithm in digital congkak
Published 2013“…To make it intelligent, its player agent was developed using a combination of Neural Networks and Min-Max algorithm. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform
Published 2009Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Analysis of online CSR message authenticity on consumer purchase intention in social media on Internet platform via PSO-1DCNN algorithm
Published 2024“…In this context, it has become an important topic to study the relationship between the authenticity of online CSR communication messages and consumers’ purchase intentions. This work proposes an algorithm based on PSO-1DCNN joint optimization to analyze the impact of online CSR information authenticity on consumers’ purchase intention in social media on the Internet platform. …”
Get full text
Get full text
Article -
17
Comparative analysis of sine cosine and social network search-based algorithm for software test redundancy reduction optimization
Published 2024“…More precisely, our work intents to investigate the algorithms' performance in terms of test reduction percentage and execution time. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
Quantitative Computational Framework For Analyzing Evidence To Identify Attack Intention And Strategy In Network Forensics
Published 2013“…The proposed framework aims to use cyber crime evidence to reconstruct attack intentions and estimate similar attack strategies. The intentions are identified through a new algorithm called Attack Intention Analysis, which predicts cyber crime intentions by combining Dempster-Shafer theory and a causal network. …”
Get full text
Get full text
Thesis -
19
Effective query structuring with ranking using named entity categories for XML retrieval
Published 2016“…Furthermore, it employs Predicates Identification Algorithm (PIA) and Entity Identification Algorithm (EIA) to identify user search intention. …”
Get full text
Get full text
Get full text
Thesis -
20
A New Mobile Botnet Classification based on Permission and API Calls
Published 2024“…As a result, 16 permissions and 31 API calls that are most related with mobile botnet have been extracted using feature selection and later classified and tested using machine learning algorithms. The experimental result shows that the Random Forest Algorithm has achieved the highest detection accuracy of 99.4% with the lowest false positive rate of 16.1% as compared to other machine learning algorithms. …”
Proceedings Paper
