Search Results - (( identification implementation level algorithm ) OR ( java implementation learning algorithm ))
Search alternatives:
- identification implementation »
- implementation learning »
- implementation level »
- java implementation »
- learning algorithm »
- level algorithm »
-
1
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
2
Register Transfer Level Implementation Of Pooling - Based Feature Extraction For Finger Vein Identification
Published 2017“…A pooling based feature extraction technique for finger vein identification was implemented in this research. The proposed algorithm extracted the local feature information of the finger vein pattern (patches), and used these patches to improve the robustness of the identification. …”
Get full text
Get full text
Thesis -
3
An Educational Tool Aimed at Learning Metaheuristics
Published 2020“…Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
Get full text
Get full text
Get full text
Thesis -
5
-
6
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
Get full text
Get full text
Get full text
Thesis -
7
-
8
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…Level one is the development of userID and password, level two involve the insertion of the testing parameter speed coding. …”
Get full text
Get full text
Get full text
Thesis -
9
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
10
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
11
Analysis characteristic and performance of passive Radio Frequency Identification (RFID) for 13.56MHz system / Mohd Faizul Azmy Amat
Published 2007“…Scopes of work include the algorithm for RFID flow in which frequency band will be continually implemented considering pre-determined constraints. …”
Get full text
Get full text
Thesis -
12
Development of biosignals-based multimodal biometric system
Published 2014“…In order to reach a higher security level, an alternative multimodal and a fusion technique is implemented into the system. …”
Get full text
Get full text
Get full text
Thesis -
13
Identification of continuous-time model of hammerstein system using modified multi-verse optimizer
Published 2021“…For the numerical identifications, three different levels of white noise variances were taken. …”
Get full text
Get full text
Thesis -
14
Improvement of Auto-Tracking Mobile Robot based on HSI Color Model
Published 2018“…For an auto tracking device, the most crucial part of the system is the object identification and tracking of the moving targets. In order to improve the accuracy of identification of object in different illumination and background conditions, the implementation of HSI color model is used in image processing algorithm. …”
Get full text
Get full text
Get full text
Article -
15
Vibration-based structural damage detection and system identification using wavelet multiresolution analysis / Seyed Alireza Ravanfar
Published 2017“…To improve the proposed algorithm, GA was utilized to identify the best choice for ‘‘mother wavelet function” and “decomposition level” of the signals by means of the fundamental fitness function. …”
Get full text
Get full text
Get full text
Thesis -
16
-
17
A framework for malware identification based on behavior
Published 2012“…The IF-THEN Prediction Rules which is generated using the data mining technique, ID3 Algorithm is used. In the implementation of malware target classification, Structure Level Rules are utilized to classify malware into possible target class. …”
Get full text
Get full text
Thesis -
18
A COLLABORATIVE FRAMEWORK FOR ANDROID MALWARE IDENTIFICATION USING DYNAMIC ANALYSIS
Published 2019Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
19
Cross-layer architecture of impulse-based ultra wideband to support the integration of Radio Frequency Identification and wireless sensor network infrastructures
Published 2012“…Adaptive transmission algorithm has been studied to show the trade-off flexibility between different specific quality of service requirements and transmission rate parameters at the physical-layer level in varied distance scenarios. …”
Get full text
Get full text
Get full text
Get full text
Article -
20
Real time nonlinear filtered-x lms algorithm for active noise control
Published 2012“…However, unlike the other algorithms, NLFXLMS cannot be implemented in real time. …”
Get full text
Get full text
Thesis
