Search Results - (( developing modul detection algorithm ) OR ( java implementation learning algorithm ))
Search alternatives:
- implementation learning »
- java implementation »
- learning algorithm »
- developing modul »
- modul detection »
-
1
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
2
Campus hybrid intrusion detection system using SNORT and C4.5 Algorithm
Published 2020“…The basis of misused detection module is snort, and anomaly detection module is constructed by using Algorithm C4.5 detectors. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Study of machine learning in computer vision using Raspberry Pi
Published 2024text::Final Year Project -
4
An Educational Tool Aimed at Learning Metaheuristics
Published 2020“…Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
Get full text
Get full text
Get full text
Thesis -
6
Real time power quality event detection using continuous wavelet transform
Published 2023“…The measurement hardware consists of data acquisition module with USB interface and the wavelet event detection algorithm was developed using MATLAB with graphical user interface to display the wavelet coefficients in real time and the recorded waveform. …”
Conference paper -
7
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
Get full text
Get full text
Get full text
Thesis -
8
Sensor module for urban vehicle two way connection monitoring system/ Muhammad Ilyasaa Abdul Rahman
Published 2015“…The project framework is divided into 2 main parts: living thing and impact detection. The sensing module will be interfaced with a microcontroller platform programmed with a set of algorithm. …”
Get full text
Get full text
Student Project -
9
A framework for Malaysian Sign Language Recognition using deep learning initiatives / Imran Md Jelas
Published 2022“…Later, Long Short-Term Memory (LSTM) artificial neural network (ANN) is proposed as training algorithm in training module and prediction algorithm in detection module to be used for the development of the actual system based on this proposed framework initiative. …”
Get full text
Get full text
Get full text
Article -
10
Enhanced Image Classification for Defect Detection on Solar Photovoltaic Modules
Published 2023“…The objective of this research was to develop and analyse feature extraction used for classification techniques for defect detection of solar photovoltaic modules surfaces. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
Intelligent DNA signature detection for internet worms
Published 2011Get full text
Get full text
Get full text
Get full text
Monograph -
12
A new modified differential evolution algorithm scheme-based linear frequency modulation radar signal de-noising
Published 2015“…The main intention of this study was to investigate the development of a new optimization technique based on the differential evolution (DE) algorithm, for the purpose of linear frequency modulation radar signal de-noising. …”
Get full text
Get full text
Article -
13
Development Of Vehicle Tracking And Counting System From Traffic Surveillance Video
Published 2015“…Simple tracking and counting algorithm is used to track and count the detected vehicle. …”
Get full text
Get full text
Thesis -
14
Relevance detection and summarizing strategies identification algorithm using linguistic measures / Seyed Asadollah Abdiesfandani
Published 2016“…The findings of the study show that, there is a strong relationship between the summary writing proficiency of students and the summarizing strategies that they used. We then develop a new algorithm to address the summarizing strategies identification problem. …”
Get full text
Get full text
Thesis -
15
-
16
Animal voice recognition for identification (ID) detection system
Published 2011“…In this paper, an animal identification (ID) detection system based on animal voice pattern recognition algorithm has been developed. …”
Get full text
Get full text
Conference or Workshop Item -
17
Dog voice identification (ID) for detection system
Published 2012“…In this paper, an animal identification (ID) detection system based on animal voice pattern recognition algorithm has been developed. …”
Get full text
Get full text
Conference or Workshop Item -
18
-
19
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
20
FPGA Implementation of Multi-User Detection Genetic Algorithm Tool for SDMA-OFDM Systems
Published 2016“…According to the results obtained from the developed algorithm and implementation tools, a high number of users can be physically possible and provided with support. …”
Get full text
Get full text
Article
