Search Results - (( evolution specifications detection algorithm ) OR ( java implementation learning algorithm ))
Search alternatives:
- evolution specifications »
- specifications detection »
- implementation learning »
- java implementation »
- learning algorithm »
-
1
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
2
An Educational Tool Aimed at Learning Metaheuristics
Published 2020“…Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
Get full text
Get full text
Get full text
Thesis -
4
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
Get full text
Get full text
Get full text
Thesis -
5
Optimized differential evolution algorithm for linear frequency modulation radar signal denoising
Published 2013“…Both architectures gave precise results for different selections of chirp rate that could fit with system specifications. The main contention of this thesis is to investigate the development of new optimization technique based on Differential Evolution algorithm (DE), applied for radar signal denoising application. …”
Get full text
Get full text
Thesis -
6
Segmentation of Retinal Vasculature using Active Contour Models (Snakes)
Published 2009“…The results shows that the algorithm outperforms many other published methods and achieved an accuracy (ability to detect both vessel and non-vessel pixels) range of 0.92-0.94, a sensitivity (ability to detect vessel pixels) range of 0.91-0.95 and a specificity (ability to detect non-vessel pixels) range of0.78-0.85. …”
Get full text
Get full text
Final Year Project -
7
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
8
An Analysis Of System Calls Using J48 And JRip For Malware Detection
Published 2018“…The evolution of malware possesses serious threat ever since the concept of malware took root in the technology industry.The malicious software which is specifically designed to disrupt,damage,or gain authorized access to a computer system has made a lot of researchers try to develop a new and better technique to detect malware but it is still inaccurate in distinguishing the malware activities and ineffective.To solve the problem,this paper proposed the integrated machine learning methods consist of J48 and JRip in detecting the malware accurately.The integrated classifier algorithm applied to examine,classify and generate rules of the pattern and program behaviour of system call information.The outcome then revealed the integrated classifier of J48 and JRip outperforming the other classifier with 100% detection of attack rate. …”
Get full text
Get full text
Get full text
Article -
9
An Analysis Of System Calls Using J48 And JRip For Malware Detection
Published 2018“…The malicious software which is specifically designed to disrupt, damage, or gain authorized access to a computer system has made a lot of researchers try to develop a new and better technique to detect malware but it is still inaccurate in distinguishing the malware activities and ineffective. …”
Get full text
Get full text
Get full text
Article -
10
Privacy optimization and intrusion detection in modbus/tcp network-based scada in water distribution systems
Published 2021“…Another problematic aspect is related to the intrusion detection solutions that are based on machine learning cluster algorithms to learn systems’ specifications and extract general state-based rules for attacks identification. …”
Get full text
Get full text
Thesis -
11
Critical review of object detection techniques for traffic light detection in intelligent transportation systems
Published 2025“…This study provides a critical review of object detection techniques specifically for traffic light detection, evaluating the evolution of machine learning frameworks, deep learning architectures, and hybrid optimization models. …”
Get full text
Get full text
Get full text
Article -
12
Analysis on target detection and classification in LTE based passive forward scattering radar
Published 2016“…The signal source is coming from the latest technology of 4G Long-Term Evolution (LTE) base station. A detailed explanation on the passive FSR receiver circuit, the detection scheme and the classification algorithm are given. …”
Get full text
Get full text
Get full text
Article -
13
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
14
Chronic kidney disease diagnostic tools based on machine learning algorithms: a review / Muhamad Huzaimi Abdul Ghafar ... [et al.]
Published 2025“…This work intends to enlighten the evolution of ML techniques in CKD diagnosis and their contemporary applications. …”
Get full text
Get full text
Get full text
Article -
15
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
16
Framework to reduce cost scrapping and cost of assemble test capacity in semiconductor integrated circuit manufacturing
Published 2020“…The proposed new framework will be able to provide a range of possible recall rates from minimum to maximum to identify which machine learning algorithms specifically.…”
Get full text
Get full text
Get full text
Article -
17
Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform
Published 2009Get full text
Get full text
Get full text
Conference or Workshop Item -
18
An Efficient Energy Aware Adaptive System-On-Chip Architecture For Real-Time Video Analytics
Published 2016“…A Performance model for Zynq is developed using analytical method and used in hardware/software codesign to facilitate algorithms mapping to hardware. Afterwards, an SoC for real-time video analytics is realized on Zynq using Harris corner detection algorithm. …”
Get full text
Get full text
Thesis -
19
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
20
Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions
Published 2017“…The project has also implemented the optimization process onto the proposed ANFIS model through the hybrid of Genetic Algorithm on the fuzzy membership function of the ANFIS model. …”
Get full text
Get full text
Get full text
Get full text
Thesis
