Search Results - (( java implementation learning algorithm ) OR ( changes data detection algorithm ))
Search alternatives:
- implementation learning »
- java implementation »
- learning algorithm »
- data detection »
- changes data »
-
1
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
2
The multiple outliers detection for circular univariate data using different agglomerative clustering algorithms
Published 2024“…It has been found that SL-Chang, CL-Chang and AL-Chang algorithms work the best in detecting outliers with low masking and swamping effect when sample size is small for any percentage of outliers and concentration parameter. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
An Educational Tool Aimed at Learning Metaheuristics
Published 2020“…Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
Get full text
Get full text
Get full text
Thesis -
5
Utilization of canny and velocity bunching algorithms for modelling shoreline change
Published 2006“…This paper introduces new method for simulating shoreline change from multi-SAR data. Edge detection algorithm such as Canny algorithm is implemented to identify shoreline. …”
Get full text
Get full text
Conference or Workshop Item -
6
The effect of different similarity distance measures in detecting outliers using single-linkage clustering algorithm for univariate circular biological data
“…Clustering algorithms can be used to create an outlier detection procedure in univariate circular data. …”
Get full text
Get full text
Get full text
Article -
7
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
Get full text
Get full text
Get full text
Thesis -
8
Early detection for server availability in University Malaya data center / Mohd Azizi Osman
Published 2016“…The current system has been used manually to monitor the servers and many changes need to fulfill current requirement. The objective of the system is to design the detection algorithm for server availability, to develop the detection algorithm for server availability and to test the detection algorithm form server availability. …”
Get full text
Get full text
Thesis -
9
Artificial immune system based on real valued negative selection algorithms for anomaly detection
Published 2015“…This shows that the Negative Selection Algorithms are equipped with the capabilities of detecting changes in data, thus appropriate for anomaly detection. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
11
Abnormal data detection model based on autoencoder and random forest algorithm: camera sensor data in autonomous driving systems
Published 2025“…This project develops an AI-based anomaly detection system. In the field of autonomous driving, abnormal data will directly affect the safety of autonomous driving systems, especially in terms of abnormal camera sensor data. …”
Get full text
Get full text
Get full text
Article -
12
Improvement real-time detection of moving vehicle in a dynamic scene using shadow removal method / Khairul Azman Ahmad, Mohd Halim Mohd Noor,Mohamad Adha Mohamad Idin
Published 2011“…There are four major steps in a background subtraction algorithm, which are pre-processing, background modeling, foreground detection, and data validation. …”
Get full text
Get full text
Research Reports -
13
-
14
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
15
-
16
Collision avoidance algorithm design for UAV base on parametric theorem and circle overlapping method / Nur Fadzilah Mohamad Radzi
Published 2013“…Finally, the collision avoidance algorithm is verified through MATLAB software. Various cases are tested to demonstrate the robustness of both collision detection and avoidance algorithms.…”
Get full text
Get full text
Thesis -
17
An online density-based clustering algorithm for data stream based on local optimal radius and cluster pruning
Published 2019“…The experimental result shows BOCEDS is able to generate new clusters and remove outdated clusters with time as data stream contents change. The experiment on noisy data stream shows that BOCEDS algorithm can detect noise with an accuracy of approximately 100%. …”
Get full text
Get full text
Thesis -
18
Image Processing Of Digital Mammograms For Breast Cancer Detection And Classification
Published 2018“…The accuracy of the algorithm developed in detecting tumour is 94.38% showing that it is relevant for use by radiologists. …”
Get full text
Get full text
Monograph -
19
Temporal video segmentation using squared form of Krawtchouk-Tchebichef moments
Published 2018“…In addition, the wipe and dissolve transitions are detected using the change-point detection technique, SVM model, and scale invariant feature transform (SIFT). …”
Get full text
Get full text
Get full text
Thesis -
20
Bayesian Network Classifiers for Damage Detection in Engineering Material
Published 2007“…The methodology used in the thesis to implement the Bayesian network for the damage detection provides a preliminary analysis used in proposing a novel fea- ture extraction algorithm (f-FFE: the f-folds feature extraction algorithm). …”
Get full text
Get full text
Thesis
