Search Results - (( java implementation learning algorithm ) OR ( coding shape based algorithm ))
Search alternatives:
- implementation learning »
- java implementation »
- learning algorithm »
- coding shape »
- shape based »
-
1
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
2
Development of computer aided three-dimensional geometric modeler based on designer's idea in twodimensional
Published 2006“…This study has proposed better solutions in terms of an enhanced thinning algorithm, a modified Freeman chain code and Vertex chain code algorithm as picture description language, and a new computational algorithm and neural network classifier for corner detection. …”
Get full text
Get full text
Monograph -
3
An Educational Tool Aimed at Learning Metaheuristics
Published 2020“…Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
Get full text
Get full text
Get full text
Thesis -
5
A biological inspired fuzzy adaptive window median filter (FAWMF) for enhancing DNA signal processing
Published 2017“…The algorithm applied to variety of DNA datasets produced noteworthy discrimination between coding and non-coding regions contrary to fixed window length conventional filters. © 2017 Elsevier B.V.…”
Get full text
Get full text
Article -
6
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
Get full text
Get full text
Get full text
Thesis -
7
Enhanced algorithms for three-dimensional object interpreter
Published 2004“…The second is the modified Freeman chain code algorithm that is used to produce chain code series that represented a thinned binary image of the sketch. …”
Get full text
Get full text
Get full text
Thesis -
8
Integration Of G-Code With Position Controller Via Interpreter Design Using MATLAB For Milling Machine Application
Published 2019“…The interpreted G-codes of random-curvy-shape, oval-shape, and circular-shape trajectories were validated experimentally on an XY milling machine positioning table resulted in RMSE values of respectively 0.0203mm and 0.0068mm, 0.0063mm and 0.0064mm, and 0.0057mm and 0.0064mm for x and y axes. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
Augmented feedforward and feedback control of a twin rotor system using real-coded MOGA
Published 2010“…A hybrid control approach comprising a feedforward intelligent command shaping technique inverse-model based PID feedback control is presented in this paper. …”
Get full text
Get full text
Get full text
Proceeding Paper -
10
Compacted dither pattern codes over MPEG-7 dominant colour descriptor in video visual depiction
Published 2010“…The results show that CDPC with Bhattacharyya classifier provides a good generalised performance for irregular shapes-based visual description as compared to the other experimental setups.…”
Get full text
Get full text
Article -
11
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
12
Block matching algorithms for motion estimation using modified Cross-Diamond-Hexagonal search / Abd Razak Mahmud
Published 2008“…The fast search for ME techniques have their own shapes or patterns to work with in order to produce the best matching algorithm. …”
Get full text
Get full text
Thesis -
13
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
14
Finite Element Modeling Of Ballistic Penetration into Fabric Armor
Published 2006“…This program (named DYNTEX) based on the mentioned algorithm is designed using MATLAB code. …”
Get full text
Get full text
Thesis -
15
Hexagon pattern particle swarm optimization based block matching algorithm for motion estimation / Siti Eshah Che Osman
Published 2019“…Due to the center biased nature of the videos, the HPSO algorithm uses an initial pattern (hexagon-shaped) to speed up the convergence of the algorithm. …”
Get full text
Get full text
Thesis -
16
Test of Self Por [decoded] trait no. 2 / Syafiq Abdul Samat
Published 2021“…Within each part, the code will sample a color, and will draw a rectangle based on sound volume level at the time the sample was taken; the louder, the taller the rectangle will be drawn. …”
Get full text
Get full text
Book Section -
17
Plant identification using combination of fuzzy c-means spatial pyramid matching, gist, multi-texton histogram and multiview dictionary learning
Published 2016“…Most of the existing plant identification methods are based on both the global shape features and the intact plant leaves. …”
Get full text
Get full text
Thesis -
18
-
19
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
20
A region-based Principal Component Analysis (PCA) technique for medical image compression
Published 2022“…While PCA is inherently limited by its matrix form, the Arbitrary ROI coding (ARC) proposed in this work models the ROI by means of a factorization approach and the arbitrary-shaped ROI contours and NROI are compressed using BTRPCA. …”
Get full text
Get full text
Get full text
Thesis
