Search Results - (( java implementation learning algorithm ) OR ( based observational methods algorithm ))
Search alternatives:
- implementation learning »
- observational methods »
- java implementation »
- learning algorithm »
- methods algorithm »
-
1
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
2
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
3
An Educational Tool Aimed at Learning Metaheuristics
Published 2020“…Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
Get full text
Get full text
Get full text
Thesis -
5
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
Get full text
Get full text
Get full text
Thesis -
6
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
7
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
8
Modified least trimmed squares method for face recognition / Nur Azimah Abdul Rahim
Published 2018“…The genetic algorithm configuration for n (number of observations) and p (parameter) was changed to assess the performance of modified method. …”
Get full text
Get full text
Thesis -
9
Disturbance-Kalman state for linear offset free MPC
Published 2022“…Based on the drawbacks observed in those methods, a novel algorithm is proposed to guarantee offset-free MPC under model-plant mismatches and disturbances by combining the two proposed methods which are the proposed Recursive Kalman estimated state method and the proposed Disturbance-Kalman state method. …”
Get full text
Get full text
Article -
10
Research On Photovoltaic Mppt Control Method Based On Improved Bas Algorithm And Variable Step-Size Inc Method
Published 2024“…Commonly used control methods include CVT method, perturbation and observation method, and incremental conductance method. …”
Get full text
Get full text
Thesis -
11
Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform
Published 2009Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Dual search maximum power point algorithm based on mathematical analysis under partially-shaded conditions
Published 2016“…In this work, the perturb and observation (P&O) method based on duty cycle adjustment is introduced, which is modified to increase speed of the search and also to reduce the oscillation.The simulation and experimental works have been performed to investigate behavior and performance of the proposed algorithm. …”
Get full text
Get full text
Thesis -
13
Deterministic Mutation-Based Algorithm for Model Structure Selection in Discrete-Time System Identification
Published 2011“…System identification is a method of determining a mathematical relation between variables and terms of a process based on observed input-output data. …”
Get full text
Get full text
Get full text
Article -
14
A maximal-clique-based clustering approach for multi-observer multi-view data by using k-nearest neighbor with S-pseudo-ultrametric induced by a fuzzy similarity
Published 2024“…The clustering results are analyzed based on several indexes. This analysis shows the efficiency of the proposed algorithm compared to the traditional clustering methods. © The Author(s), under exclusive licence to Springer-Verlag London Ltd., part of Springer Nature 2024.…”
Get full text
Get full text
Article -
15
Improved intrusion detection algorithm based on TLBO and GA algorithms
Published 2021“…The proposed method combined the New Teaching-Learning-Based Optimization Algorithm (NTLBO), Support Vector Machine (SVM), Extreme Learning Machine (ELM), and Logistic Regression (LR) (feature selection and weighting) NTLBO algorithm with supervised machine learning techniques for Feature Subset Selection (FSS). …”
Get full text
Get full text
Get full text
Article -
16
The performance of k-means clustering method based on robust principal components
Published 2018“…The k-means clustering method is the most widely used method to group n observations into k clusters. …”
Get full text
Get full text
Article -
17
Observer-based fault detection approach using fuzzy adaptive poles placement system with real-time implementation
Published 2021“…This paper validated the system simulation by implementing fault detection algorithms by using a real-time embedded observer-based system. …”
Get full text
Get full text
Article -
18
Power Stabilization Of A Stand-Alone Solar System Using Perturb and Observe MPPT Algorithm
Published 2010“…This paper presents the method of power stabilization of a stand-alone solar system using perturb and observe (P&O) maximum power point algorithm. …”
Get full text
Get full text
Conference or Workshop Item -
19
Modeling flood occurences using soft computing technique in southern strip of Caspian Sea Watershed
Published 2012“…In recent years soft computing methods like fuzzy logic and genetic algorithm are being used in modeling complex processes of hydrologic events. …”
Get full text
Get full text
Thesis -
20
Safe experimentation dynamics algorithm for data-driven PID controller of a class of underactuated systems
Published 2019“…The performance comparison was made only between the SED based method and G-NL-SPSA based method. In addition, the average percentage of the control objective improvement retrieved from the 30 trials for each method was also observed.…”
Get full text
Get full text
Thesis
