Search Results - (( java implementation learning algorithm ) OR ( data identification task algorithm ))
Search alternatives:
- implementation learning »
- java implementation »
- data identification »
- identification task »
- learning algorithm »
- task algorithm »
-
1
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
2
An Educational Tool Aimed at Learning Metaheuristics
Published 2020“…Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
Get full text
Get full text
Get full text
Thesis -
4
-
5
-
6
Author identification for under-resourced language Kadazandusun
Published 2020“…This paper presents the task of Author Identification for KadazanDusun language by using tweets as the source of data to perform Author Identification task of short text on KadazanDusun, which is considered as one the under-resourced language in Malaysia. …”
Get full text
Get full text
Get full text
Get full text
Article -
7
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
Get full text
Get full text
Get full text
Thesis -
8
Complex word identification model for lexical simplification in the Malay language for non-native speakers
Published 2023“…Lexical Simplification (LS), a method in TS, is the task of converting words into simpler words. Past studies have shown weaknesses in the LS first task, called Complex Word Identification (CWI), where simple and complex words have been misidentified in previous CWI model. …”
Get full text
Get full text
Get full text
Thesis -
9
Identification and Grading of Manage Using Image Processing
Published 2021“…This project has developed an image processing algorithm for a systematic maturity identification of "Mangga Susu Thai Gold" mangos. …”
Get full text
Get full text
Final Year Project -
10
Comparison between multi-objective and single-objective optimization for the modeling of dynamic systems
Published 2013Get full text
Working Paper -
11
An improved plant identification system by Fuzzy c-means bag of visual words model and sparse coding
Published 2020“…Performance of proposed methods surpass the classic bag of words algorithm for plant identification tasks.…”
Get full text
Get full text
Get full text
Article -
12
Educational project on a simple voice identification using mel-frequency cepstrum coefficients and vector quantization
Published 2008“…The estimation fundamental frequency is performed with Harmonic Product Spectrum (HPS) algorithm, whilst MFCC is calculated using Discrete Cosine Transform, then, is modeled with Vector Quantization to compress the size of data to be processed and to assist identification.…”
Get full text
Get full text
Proceeding Paper -
13
An efficient fuzzy clustering algorithm for mining user session clusters on web log data
Published 2021“…In addition, the methodologies to preprocess the net log data as well as data cleanup client identification and session identification are going to be mentioned. …”
Get full text
Get full text
Get full text
Get full text
Article -
14
Rockfall source identification using a hybrid Gaussian mixture-ensemble machine learning model and LiDAR data
Published 2019“…The availability of high-resolution laser scanning data and advanced machine learning algorithms has enabled an accurate potential rockfall source identification. …”
Get full text
Get full text
Get full text
Article -
15
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
16
Scalability and performance in duplicate detection : relational vs. graph database
Published 2023“…As a result, they may not be effective in identifying and resolving duplicate data in certain use cases. Graph-based algorithms such as community detection, may prove beneficial as it can capture a more complex relationships between data. …”
Get full text
Get full text
Undergraduates Project Papers -
17
Nonlinear identification of a small scale unmanned helicopter using optimized NARX network with multiobjective differential evolution
Published 2014“…This study proposes a hybrid of conventional back propagation training algorithm for the NARX network and multiobjective differential evolution (MODE) algorithm for identification of a nonlinear model of an unmanned small scale helicopter from experimental flight data.The proposed hybrid algorithm was able to produce models with Pareto-optimal compromise between the design objectives. …”
Get full text
Get full text
Get full text
Article -
18
Video image processing for traffic analysis
Published 1992“…In recent years the application of computer-based image processing techniques to a range of traffic data collection tasks has been successfully demonstrated. …”
Get full text
Get full text
Get full text
Article -
19
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
20
Fraud detection in shipping industry based on location using machine learning comparison techniques
Published 2023“…Inspecting shipments and verifying related documents for a huge volume of shipments task is becoming such an impossible task and it’s no longer sustainable as the volume continues to surge in locations all around the world. …”
text::Thesis
