Search Results - (( developing system learning algorithm ) OR ( java implementation among algorithm ))
Search alternatives:
- implementation among »
- java implementation »
- learning algorithm »
- system learning »
- among algorithm »
-
1
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
2
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
3
A Toolkit for Simulation of Desktop Grid Environment
Published 2014“…A simulator for desktop grid environment has been developed using Java as the implementation language due to its wide popularity. …”
Get full text
Get full text
Final Year Project -
4
Development of self-learning algorithm for autonomous system utilizing reinforcement learning and unsupervised weightless neural network / Yusman Yusof
Published 2019“…By integrating both algorithms, a system will be able to acquire knowledge, learn, record and recall experience thus enables an autonomous system to self-learn. …”
Get full text
Get full text
Thesis -
5
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…According to the simulation results, the proposed algorithm produces the best solution among all algorithms in the proposed cases. � 2021 Little Lion Scientific…”
Review -
6
Network game (Literati) / Chung Mei Kuen
Published 2003“…The main aspect of this thesis is to produce a networked gaming system, which process players. requested to play the game and enabling users to play the graphical game with people through the network. The algorithm design and implementation method must not only be workable, but also highly efficient in terms of execution speed and response time. …”
Get full text
Get full text
Thesis -
7
DESIGN AND DEVELOPMENT OF ANDROID-BASED LEARNING MEDIA FOR LEARNING ALGORITHM AND DATA STRUCTURE
Published 2021“…The research method uses a waterfall-type system development life cycle (SDLC). The results of the study are learning media algorithms and data structures can be designed for Android devices. …”
Get full text
Get full text
Get full text
Proceeding -
8
A conceptual multi-agent framework using ant colony optimization and fuzzy algorithms for learning style detection
Published 2023“…The multi-agent system applies ant colony optimization and fuzzy logic search algorithms as tools to detecting learning styles. …”
Conference Paper -
9
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…The simulation is implemented with iFogSim and java programming language. …”
Get full text
Get full text
Article -
10
Development of Machine Learning Algorithm for Acquiring Machining Data in Turning Process
Published 2004“…An Intelligent Learning System for the turning process was developed. …”
Get full text
Get full text
Thesis -
11
A New Machine Learning-based Hybrid Intrusion Detection System and Intelligent Routing Algorithm for MPLS Network
Published 2024“…The research is divided into three parts, which are (1) dataset development, (2) algorithm development, and (3) algorithm performance evaluation. …”
Article -
12
Machine learning: tasks, modern day applications and challenges
Published 2019“…Machine learning algorithms learned from available data. Further, this learning laid the foundation to develop AI for the various systems around us. …”
Get full text
Get full text
Get full text
Article -
13
Comparison of performances of Jaya Algorithm and Cuckoo Search algorithm using benchmark functions
Published 2022“…CS and JA have implemented in the same platform (Intellij IDEA Community Edition 2020.2.3) using the same language (Java). …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
A machine learning approach to tourism recommendations system
Published 2025“…This project aims to develop a tourism attractions recommendation system by integrating machine learning recommendation algorithms. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
15
Mobile machine vision for railway surveillance system using deep learning algorithm
Published 2021“…In this paper, object detection model is developed and implemented with deep learning algorithm. …”
Get full text
Get full text
Get full text
Get full text
Proceedings -
16
Rao-SVM machine learning algorithm for intrusion detection system
Published 2020“…Most of the intrusion detection systems are developed based on optimization algorithms as a result of the increase in audit data features; optimization algorithms are also considered for IDS due to the decline in the performance of the human-based methods in terms of their training time and classification accuracy. …”
Get full text
Get full text
Get full text
Article -
17
Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun
Published 2000“…This system is achieved using the Genetic Algorithm which is capable of performing information retrieval and learning algorithm. …”
Get full text
Get full text
Thesis -
18
-
19
A Reference Based Surface Defect Segmentation Algorithm For Automatic Optical Inspection System
Published 2020“…This study aims to develop an algorithm for the AOI system to segment and detect surface defects, requiring low processing power and a small number of learning dataset with labelling error resistance. …”
Get full text
Get full text
Thesis -
20
Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems
Published 2022“…Most of the currently existing intrusion detection systems (IDS) use machine learning algorithms to detect network intrusion. …”
Get full text
Get full text
Thesis
