Search Results - (( java implementation learning algorithm ) OR ( data extraction protocol algorithm ))
Search alternatives:
- implementation learning »
- java implementation »
- learning algorithm »
- protocol algorithm »
-
1
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
2
Text Extraction Algorithm for Web Text Classification
Published 2010“…This study provides a text extraction algorithm for web text classification. The extraction algorithm consists of three phases namely web page extraction, rule formulation, and algorithm validation. …”
Get full text
Get full text
Get full text
Thesis -
3
Routine insulin sliding scale protocol versus software driven algorithm (star protocol) for blood glucose management of critically ill patients in the ICU: A prospective observatio...
Published 2018“…The data collected was subsequently simulated with the software driven algorithm (STAR protocol) and results were analysed to determine if it was better at maintaining blood glucose levels within set targets of 6-10 mmol/L. …”
Get full text
Get full text
Thesis -
4
An Educational Tool Aimed at Learning Metaheuristics
Published 2020“…Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
Get full text
Get full text
Get full text
Thesis -
6
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
Get full text
Get full text
Get full text
Thesis -
7
Automated feature extraction on brain MRI images for predicting multiple sclerosis patient disability
Published 2022“…Furthermore, they were using manual and semi-automated features extraction. Unlike previous studies, this study aims to predict MS patients’ disability by using automated feature extraction, single MRI scan, and single MRI protocol, without patient follow up. …”
Get full text
Get full text
Get full text
Thesis -
8
-
9
Vehicular ad-hoc network (vanets) for electrical vehicle charging management
Published 2025text::Thesis -
10
Obligation and Prohibition Norms Mining Algorithm for normative multi-agent systems
Published 2023“…The algorithm exploits the resources of the host system, implements data formatting, filtering, and extracting the exceptional events, i.e. those that entail rewards and penalties of the obligation and prohibition norms and identifies the ensuing normative protocol. …”
Conference paper -
11
Automated feature extraction for predicting multiple sclerosis patient disability using brain MRI
Published 2022“…This study aims to predict MS patients' disability using fully automated feature extraction, single MRI scan, single MRI protocols and without patient follow-up. …”
Get full text
Get full text
Article -
12
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
13
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
14
Assessing the efficacy of machine learning algorithms for syncope classification: A systematic review
Published 2024“…Extracted data encompassed subject count, age range, syncope protocols, ML type, hemodynamic parameters, and performance metrics. …”
Get full text
Get full text
Article -
15
Internet of Things (IoT) based activity recognition strategies in smart homes: a review
Published 2022“…The obtained data can be subjected to extensive preprocessing and feature extraction tasks before being learned using appropriate machine learning or deep learning algorithms to generate a model capable of managing human activities more effectively. …”
Get full text
Get full text
Article -
16
Trace analyzer for NS-2
Published 2023“…In order to ease the process of extracting data for performance study, the NS-2 Trace Analyzer is proposed. …”
Conference paper -
17
Effects of Authentication of Users in Mobile Internet Protocol Version 6
Published 2004“…Tracegraph201 is used to generate plots, from which data is extracted and then plotted again using Excel for comparison purposes. …”
Get full text
Get full text
Thesis -
18
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
19
Secure lightweight client for cloud-based E-Health Model
Published 2023“…This algorithm verifies the identity and permission of non-group members to meet the strict privacy protection requirements of EHRs data. …”
Get full text
Get full text
Get full text
Thesis -
20
Development of LabVIEW FPGA program for Energy Management System (EMS) Controller for Hybrid Electric Vehicle (HEV)
Published 2016“…The communication between server and client will be implemented using HTTP-based communication protocol making the data appear in HyperText Mark-up Language (HTML) which will be rendered into the Graphical User Interface (GUI) web page interface. …”
Get full text
Get full text
Final Year Project
