Search Results - (( development smart data algorithm ) OR ( java implementation learning algorithm ))
Search alternatives:
- implementation learning »
- java implementation »
- learning algorithm »
- development smart »
- data algorithm »
-
1
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
2
Smart energy meter with adaptive communication data transfer algorithm for electrical energy monitoring
Published 2021“…Thus, in this thesis, a new Smart Energy Meter (SEM) with adaptive data transfer algorithm is designed to accommodate the problem. …”
Get full text
Get full text
Thesis -
3
An Educational Tool Aimed at Learning Metaheuristics
Published 2020“…Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
Get full text
Get full text
Get full text
Thesis -
5
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
Get full text
Get full text
Get full text
Thesis -
6
Development of a wearable human fall detection system
Published 2022“…This system embraces the Internet of Things (IoT), big data, and data analytics concepts as well as allows data-driven healthcare to be developed.…”
Get full text
Get full text
Article -
7
A novel scheduling algorithm based on game theory and multicriteria decision making in LTE network
Published 2015“…The novel algorithm has proven to be an effective scheduling technique for smart grid applications.…”
Get full text
Get full text
Get full text
Article -
8
CONTEXT AWARE TRAFFIC SCHEDULING ALGORITHM FOR COMMUNICATION SYSTEM IN POWER DISTRIBUTION NETWORK
Published 2023“…Lost or delayed data result in incorrect control actions and risk the stability of smart grid. …”
text::Thesis -
9
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
10
Comparison of hidden Markov Model and Naïve Bayes algorithms among events in smart home environment
Published 2014“…The subsystems, due to their diversified nature develop difficulties as the events communicate making the smart home uncomfortable. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Design of smart waste bin and prediction algorithm for waste management in household area
Published 2018“…The limitation to this study is that the amount of smart waste bin should be replicated more so that all data for waste weight is directly collected from the smart waste bin.…”
Get full text
Get full text
Get full text
Get full text
Article -
12
Secured agriculture sensor data based on end-to-end encryption using raspberry pi
Published 2025“…The system integrates multiple robust encryption algorithms—AES-128, AES-256, ChaCha20, and Twofish—for end-to-end data protection. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
13
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
14
Intelligent decision support systems: transforming smart cities management
Published 2024“…A comparison of the energy used by promised by these algorithms including LSTM, SVM, KNN, and the OPTIMUS, a system is developed that enables smart cities to significantly save energy hence highlighting its efficiency. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
15
Development of artificial neural network models for predicting lipid profile using smartMF electrical parameters / Ahmad Zulkhairi Zulkefli
Published 2021“…Statistical analysis including T-Test and logistic regression analysis for the bioelectrical parameters were employed to understand the data and determine suitable predictors to be used for the development of the ANN. …”
Get full text
Get full text
Get full text
Thesis -
16
IoT-BSEM internet of things-based smart energy meter for domestic house
Published 2023“…The microcontroller receives the measured data from the sensor and calculated using developed algorithm, then data sent to the IoT cloud. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
-
18
Smart IoT energy optimisation and localisation monitoring for e-bike sharing
Published 2025“…To address these challenges, this project developed a Smart IoT Energy Optimization and Localization Monitoring System that integrates multi-sensor data, IoT connectivity, and advanced data analytics to monitor real-time usage patterns, battery levels, and the location of e-bikes. …”
Get full text
Get full text
Get full text
Get full text
Article -
19
-
20
Making location-aware computing working accurately in smart spaces
Published 2011“…WiFi, GPS, GSM and Accelerometer. The algorithm is based on opportunistic localization algorithm and fuse different sensor data in order to be able to use the data which is available at the user position and processable in a mobile device.…”
Get full text
Get full text
Get full text
Book Chapter
