Search Results - (( developing normalization techniques algorithm ) OR ( java implementation learning algorithm ))
Search alternatives:
- developing normalization »
- normalization techniques »
- implementation learning »
- java implementation »
- learning algorithm »
-
1
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…On the Construction phase, the development of the prototype has been started. All the algorithm for the engine has been developed by using Java script language. …”
Get full text
Get full text
Thesis -
2
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
3
An Educational Tool Aimed at Learning Metaheuristics
Published 2020“…Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
Get full text
Get full text
Get full text
Thesis -
5
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
Get full text
Get full text
Get full text
Thesis -
6
An improved recommender system based on normalization of matrix factorization and collaborative filtering algorithms
Published 2015“…It is concluded that the resultant hybrid techniques can perform well if the variables provided to normalization by neighborhood model (MF and CF) do not have big differences in order for the hybrid normalization model to outperform every algorithm in comparison.…”
Get full text
Get full text
Thesis -
7
Data normalization techniques in swarm-based forecasting models for energy commodity spot price
Published 2014“…Data mining is a fundamental technique in identifying patterns from large data sets.The extracted facts and patterns contribute in various domains such as marketing, forecasting, and medical.Prior to that, data are consolidated so that the resulting mining process may be more efficient.This study investigates the effect of different data normalization techniques.which are Min-max, Z-score and decimal scaling, on Swarm-based forecasting models.Recent swarm intelligence algorithms employed includes the Grey Wolf Optimizer (GWO) and Artificial Bee Colony (ABC).Forecasting models are later developed to predict the daily spot price of crude oil and gasoline.Results showed that GWO works better with Z-score normalization technique while ABC produces better accuracy with the Min-Max.Nevertheless, the GWO is more superior than ABC as its model generates the highest accuracy for both crude oil and gasoline price.Such a result indicates that GWO is a promising competitor in the family of swarm intelligence algorithms.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Text normalization algorithm for facebook chats in Hausa language
Published 2014“…The proposed algorithm manually developed dictionary that employ normalization of each non-standard word with its equivalent standard word. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
9
A new method for intermediate power point tracking for PV generator under partially shaded conditions in hybrid system
Published 2018“…This technique is based on the combination of two algorithms, the particle swarm optimization algorithm for tracking the global maximum power point, while a newly developed algorithm is used for attaining any other supervisory control set point. …”
Get full text
Get full text
Article -
10
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
11
Semi-automatic cortical boundary detection / Noor Elaiza Abdul Khalid.
Published 2010“…For this purpose, two algorithm are has been developed to automatically detect the OC and IC. …”
Get full text
Get full text
Thesis -
12
Taguchi?s T-method with Normalization-Based Binary Bat Algorithm
Published 2025“…Therefore, a variable selection technique using a swarm-based Binary Bat algorithm is proposed. …”
Conference paper -
13
Solving non-convex economic dispatch problem using computational intelligence technique
Published 2023Conference Paper -
14
Dynamic Robust Bootstrap Algorithm for Linear Model Selection Using Least Trimmed Squares
Published 2009“…Another possibility is to apply a bootstrap technique which does not rely on the normality assumption. …”
Get full text
Get full text
Thesis -
15
Logic Programming In Radial Basis Function Neural Networks
Published 2013“…Two techniques were developed. The first technique is to encode the logic programming in radial basis function neural networks. …”
Get full text
Get full text
Thesis -
16
-
17
Adaptive policing and shaping algorithms on inbound traffic using generalized Pareto distribution / Nor Azura Ayop
Published 2016“…The percentage level 5% under original bandwidth used is developed on policing and shaping algorithms to control bandwidth used. …”
Get full text
Get full text
Thesis -
18
Iris Recognition As Biometric Authentication
Published 2016“…In this project, an iris recognition technique based on the John Daugman’s algorithm is used. …”
Get full text
Get full text
Final Year Project -
19
Application of Technology Acceptance Model on Database Normalizer
Published 2011“…The main objective of this study is to develop a database normalizer application to normalize the database tables up to the third normal form (3NF). …”
Get full text
Get full text
Get full text
Thesis -
20
Application of Evolutionary Algorithm for Assisted History Matching
Published 2014“…Today, tremendous efforts are made to develop Automatic History Matching algorithms. While the automatic method focus on optimization which is normally computer based. …”
Get full text
Get full text
Final Year Project
