Search Results - (( java implementation learning algorithm ) OR ( data compression detection algorithm ))
Search alternatives:
- implementation learning »
- compression detection »
- java implementation »
- learning algorithm »
- data compression »
-
1
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
2
An Educational Tool Aimed at Learning Metaheuristics
Published 2020“…Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
Get full text
Get full text
Get full text
Thesis -
4
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
Get full text
Get full text
Get full text
Thesis -
5
Compression Header Analyzer Intrusion Detection System (CHA - IDS) for 6LoWPAN Communication Protocol
Published 2018“…In this paper, we propose an IDS known as compression header analyzer intrusion detection system (CHA-IDS) that analyzes 6LoWPAN compression header data to mitigate the individual and combination routing attacks. …”
Get full text
Get full text
Article -
6
Research on the construction of an efficient and lightweight online detection method for tiny surface defects through model compression and knowledge distillation
Published 2024“…In response to the current issues of poor real-time performance, high computational costs, and excessive memory usage of object detection algorithms based on deep convolutional neural networks in embedded devices, a method for improving deep convolutional neural networks based on model compression and knowledge distillation is proposed. …”
Get full text
Get full text
Article -
7
Fault detection of aircraft engine components using fuzzy unordered rule induction algorithm
Published 2016“…This paper proposes auto encoder neural network for compressing of high dimensional sensory data and classification using Fuzzy Unordered Rule Induction Algorithm (FURIA) with emphasis on detection and isolation of incipient faults. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
8
Performance evaluation for compression-accuracy trade-off using compressive sensing for EEG-based epileptic seizure detection in wireless tele-monitoring
Published 2013“…Discrete cosine transform (DCT) and compressive sensing are used for EEG signals acquisition and compression.To obtain low-complexity energy-efficient, the best data accuracy with higher compression ratio is sought. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
An enhance embedding method using edge and textures detection for image steganography
Published 2024“…This compression can lead to content loss and makes the hidden data vulnerable to steganalysis. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
Compression of Three-Dimensional Terrain Data Using Lifting Scheme Based on Second Generation Wavelets
Published 2006“…The newly developed algorithm was applied to compress Light Detection and Ranging (LIDAR) data to check the efficiency of the program. …”
Get full text
Get full text
Thesis -
11
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
12
Development Of A Robust Blind Digital Video Watermarking Algorithm Using Discrete Wavelet Transform
Published 2007“…Video watermarking technology enables us to hide an imperceptible, robust, and secure data in digital or analog video. This data can be used for tracking, fingerprinting, copyright infringement detection or any other application that requires some hidden data. …”
Get full text
Get full text
Thesis -
13
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
14
Compressed Sensing Implementations For Sparse Channel Estimation In OFDM Systems
Published 2018“…Additionally, at BER value of 2×10−3 the proposed CoFA and SdMP algorithms for CE have around 9%, 14%, 19.5% and 25% and around 5%, 10%, 14% and 22.5% performance improvement when compared to FACS, gOMP, OMP and ROMP algorithms, respectively.…”
Get full text
Get full text
Thesis -
15
Real-time time series error-based data reduction for internet-of-things applications
Published 2018“…There are many time series data reduction methods, ranging from primitive data aggregation such as Rate of Change to sophisticated compression algorithms. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
16
Enhancement of most significant bit (MSB) algorithm using discrete cosine transform (DCT) in non-blind watermarking / Halimah Tun Abdullah
Published 2014“…This is because many attackers attempt to retrieve the secret data from an image than audio and video. The algorithm and techniques that implemented in this project is Most Significant Bit (MSB) algorithm and Discrete Cosine Transform (OCT) as a technique for embedding process. …”
Get full text
Get full text
Thesis -
17
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
18
Frame selection based on modified entropy and object motion for secured data hiding in videos
Published 2021“…Videos provide additional hidden-space in the video data. Compression methods have been widely applied in multimedia applications. …”
Get full text
Get full text
Thesis -
19
Framework for stream clustering of trajectories based on temporal micro clustering technique
Published 2018“…The minimum description length is an important concept in information theory and computational learning in which the best hypothesis for a given data set is the one that leads to the best compression of the data. …”
Get full text
Get full text
Thesis -
20
Sauvola Segmentation and Support Vector Machine-Salp Swarm Algorithm Approach for Identifying Nutrient Deficiencies in Citrus Reticulata Leaves
Published 2024“…Integrating SSA and SVM machine learning algorithms improves decision-making processes, leading to better crop yield through early detection and timely nutrient management. …”
Get full text
Get full text
Get full text
Get full text
Thesis
