Search Results - (( java implementation learning algorithm ) OR ( basic data virtualization algorithm ))
Search alternatives:
- virtualization algorithm »
- implementation learning »
- java implementation »
- data virtualization »
- learning algorithm »
- basic data »
-
1
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
2
A real-time vision-based touchless interaction of virtual heart using integration of motion gesture interaction methods
Published 2014“…The Feedback is to produce response from the user regarding the motion data and the position of gestures. Gesture Recognition is to recognise the gestures and performs the basic transformation of the virtual heart. …”
Get full text
Get full text
Academic Exercise -
3
An Educational Tool Aimed at Learning Metaheuristics
Published 2020“…Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
Get full text
Get full text
Get full text
Thesis -
5
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
Get full text
Get full text
Get full text
Thesis -
6
Using text mining algorithm to detect gender deception based on Malaysian chatroom lingo / Dianne L.M. Cheong and Nur Atiqah Sia Abdullah@Sia Sze Yieng
Published 2006“…Based on this designed text algorithm, a prototype in Visual Basic is developed. …”
Get full text
Get full text
Research Reports -
7
Using text mining algorithm to detect gender deception based on Malaysian chat room lingo / Dianne L. M. Cheong and Nur Atiqah Sia Abdullah @ Sia Sze Yieng
Published 2006“…Based on this algorithm. a prototype in Visual Basic is developed It was tested with /6 documents; each consists of 5 e-mails exchanges of respective individuals. …”
Get full text
Get full text
Get full text
Article -
8
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
9
-
10
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
11
Augmented reality monitoring system for cross-belt conveyor in advanced automation line / Sukarnur Che Abdullah ... [et al.]
Published 2025“…The algorithm's efficacy was validated through its application to a basic material handling process, specifically a barcode sorting conveyor. …”
Get full text
Get full text
Get full text
Article -
12
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
13
An ensemble feature selection method to detect web spam
Published 2018“…Web spam detection is one of research fields of data mining. With regard to increasing available information in virtual space and the need of users to search, the role of search engines and used algorithms are important in terms of ranking. …”
Get full text
Get full text
Get full text
Article -
14
A calibration framework for swarming ASVs' system design
Published 2012“…This paper is concerned with the virtual simulation of Autonomous Surface Vessels (ASVs) named, Drosobots, using virtual simulation software i. e. …”
Get full text
Get full text
Get full text
Article -
15
Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform
Published 2009Get full text
Get full text
Get full text
Conference or Workshop Item -
16
On uniform traffic pattern of symmetric midimew connected mesh network
Published 2015Get full text
Get full text
Get full text
Proceeding Paper -
17
Heuristic resource allocation algorithm for controller placement in multi-control 5G based on SDN/NFV architecture
Published 2021“…However, the management of resource allocations across multiple data centers is an important issue that still affects 5G core networks. …”
Get full text
Get full text
Get full text
Article -
18
IoT based IMU sensor network for human arm pose estimation / Jahangir Hassan Khan
Published 2019“…The objective of this project is to design and build an IoT based sensor system that can send its data wirelessly to a computer, which can then analyse the data and estimate the position of the human arm at remote location. …”
Get full text
Get full text
Get full text
Thesis -
19
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
20
Application of clustering in managing unstructured textual data in relational database / Wael Mohamed Shaher Yafooz
Published 2014“…However, the database structure can still contain large amounts of unstructured textual data. Dealing with unstructured textual data leads to three basic issues; users encounter difficulties to find useful information, inaccurate information retrieval and insufficient performance of query processing. …”
Get full text
Get full text
Thesis
