Search Results - (( developing extending learning algorithm ) OR ( java evaluation method algorithm ))
Search alternatives:
- developing extending »
- extending learning »
- learning algorithm »
- method algorithm »
- java evaluation »
-
1
System identification using Extended Kalman Filter
Published 2017“…System identification is getting more intensive from researcher to develop an algorithm with work efficiently and more accurate. …”
Get full text
Get full text
Student Project -
2
Information Theoretic-based Feature Selection for Machine Learning
Published 2018“…Three major factors that determine the performance of a machine learning are the choice of a representative set of features, choosing a suitable machine learning algorithm and the right selection of the training parameters for a specified machine learning algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
3
Fuzzy modeling using Bat Algorithm optimization for classification
Published 2018“…In order to solve it, Bat Algorithm method is implement in to optimization method in fuzzy modeling for classification. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
4
An extended adaptive mechanism of evolutionary based channel assignment via reinforcement
Published 2012Get full text
Get full text
Research Report -
5
-
6
Security Analysis Between Static And Dynamic S-boxes In Block Ciphers
Published 2024Get full text
Article -
7
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
8
Algorithm-program visualization model : An intergrated software visualzation to support novices' programming comprehension
Published 2015“…This model is then to be used in the prototype tool development that is called 3De-ALPROV (Design Development Debug – Algorithm Program Visualization). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
Comparison of performances of Jaya Algorithm and Cuckoo Search algorithm using benchmark functions
Published 2022“…To help engineers select the best metaheuristic algorithms for their problems, there is a need to evaluate the performance of different metaheuristic algorithms against each other using common case studies. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Kernel and multi-class classifiers for multi-floor wlan localisation
Published 2016“…Unlike the classical kNN algorithm which is a regression type algorithm, the proposed localisation algorithms utilise machine learning classification for both linear and kernel types. …”
Get full text
Get full text
Thesis -
11
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…An experimental analysis is conducted by several experiments to evaluate the performance of the proposed ensemble methods which has been tested on the 4 benchmark datasets, namely LingSpam, SpamAssassin, Spambase and CSDMC2010. …”
Get full text
Get full text
Thesis -
12
Evaluating Adan vs. Adam: an analysis of optimizer performance in deep learning
Published 2025“…Choosing a suitable optimization algorithm in deep learning is essential for effective model development as it significantly influences convergence speed, model performance, and the success of the train- ing process. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
13
Analysis of Travellers’ Online Reviews in Social Networking Sites Using Fuzzy Logic Approach
Published 2019“…To develop the recommendation method, we use clustering and prediction machine learning techniques. …”
Get full text
Get full text
Article -
14
Bio-signal identification using simple growing RBF-network (OLACA)
Published 2007“…These algorithms are developed primarily for applications with fast sampling rate which demands significant reduction in computation load per iteration. …”
Get full text
Get full text
Conference or Workshop Item -
15
A multi-filter feature selection in detecting distributed denial-of-service attack
Published 2019“…In addition, the proposed M2FS method is developed through WEKA API with Java Programming language using the IDE of Eclipse Java. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
Get full text
Get full text
Get full text
Thesis -
17
Hybrid learning control schemes with input shaping of a flexible manipulator system.
Published 2006“…This is then extended to incorporate iterative learning control with acceleration feedback and genetic algorithms (GAs) for optimization of the learning parameters and a feedforward controller based on input shaping techniques for control of vibration (flexible motion) of the system. …”
Get full text
Get full text
Get full text
Article -
18
Feedforward neural network for solving particular fractional differential equations
Published 2024“…Then, a single hidden layer of FNN based on Chelyshkov polynomials with an extreme learning machine algorithm (SHLFNNCP-ELM) is constructed for solving FDEsC. …”
Get full text
Get full text
Get full text
Thesis -
19
An intelligent framework for modelling and active vibration control of flexible structures
Published 2004“…The work is further extended to developing and integrating the idea of active control of flexible structures into an interactive learning environment. …”
Get full text
Get full text
Get full text
Thesis -
20
Software metrics selection model for predicting maintainability of object-oriented software using genetic algorithms
Published 2016“…The software metric thresholds were used as indication for identifying unsafe design in software engineering. To evaluate this technique, an experiment was conducted on two geospatial systems developed using Java programming language where the Chidamber and Kemerer (CK) metrics were used. …”
Get full text
Get full text
Thesis
