Search Results - (( java implementation learning algorithm ) OR ( data interpolating new algorithm ))
Search alternatives:
- implementation learning »
- java implementation »
- learning algorithm »
- data interpolating »
- interpolating new »
- new algorithm »
-
1
Numerical Integration And Data Reduction For Application In Photometry
Published 2003“…In this thesis, an algorithm based on a local interpolation scheme called the Average Angle Method was developed for numerical integration and data reduction of photometric data, and in general, for any data set sharing similar characteristics as the luminous intensity data The new interpolation scheme interpolates discrete data with piecewise cubic polynomials having a CI continuity in the interior. knots. …”
Get full text
Get full text
Thesis -
2
Exponential Parameterized Cubic B-Spline Curves And Surfaces
Published 2020“…In developing B-spline curve interpolation method, an algorithm is presented for interpolating data points. …”
Get full text
Get full text
Thesis -
3
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
4
New Curve Fitting Method for Petroleum Engineering Applications
Published 2014“…Unsuitable type of curve fitting may destroy the original feature of the data. This research is about the invention of new curve fitting method that combined two interpolation method which are Cubic Spline and Piecewise Cubic Hermite Interpolation Polynomial (PCHIP) with the reduction of data method. …”
Get full text
Get full text
Final Year Project -
5
An Educational Tool Aimed at Learning Metaheuristics
Published 2020“…Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
Get full text
Get full text
Get full text
Thesis -
7
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
Get full text
Get full text
Get full text
Thesis -
8
A novel algorithm for modeling and mapping of 3D terrain in autonomous reconnaissance
Published 2012“…The algorithm uses fractal interpolation to generate 3D terrain surface. …”
Get full text
Get full text
Get full text
Article -
9
A new hybrid multiaxial fatigue life model based on critical plane continuum damage mechanics and genetic algorithm
Published 2015“…The notion of characteristic profiles for the calibration of the model is also coherent with the application of equivalent fatigue loading in generating experimental data for calibration. The model is simple in application with the use of genetic algorithm for model calibration making use of only the material fatigue limit. …”
Get full text
Get full text
Thesis -
10
Underwater Acoustic Communication (UWA) Data Packet Size Optimization based on Throughput
Published 2010Get full text
Get full text
Final Year Project -
11
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
12
Efficient visualization of scattered energy distribution data by using cubic timmer triangular patches
Published 2019“…This chapter discusses the application of the new cubic Timmer triangular patches constructed by Ali et al. 1 to interpolate the irregularly scattered data with C1 continuity. …”
Get full text
Get full text
Book -
13
Efficient visualization of scattered energy distribution data by using cubic timmer triangular patches
Published 2019“…This chapter discusses the application of the new cubic Timmer triangular patches constructed by Ali et al. 1 to interpolate the irregularly scattered data with C1 continuity. …”
Get full text
Get full text
Book -
14
A new protocol of dual deniability encryption techniques based on asymmetric secret sharing method / Mohsen Mohamad Hata
Published 2019“…Secret Sharing technique is used to generate Fake Asymmetric Keys by using LaGrange Polynomial Interpolation formula and RSA algorithm. Secured communication is achieved where the notion of plausible deniability is successfully implemented by fusing the processes of theorem's verification and data's validation in the protocol construction methodology.…”
Get full text
Get full text
Thesis -
15
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
16
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
17
Narrowband array processing beamforming technique for electrical impedance tomography
Published 2023“…This method could possibly open new avenues for spatial EIT data filtering techniques with an understanding that the inverse problem is more likely considered here as a source localization algorithm instead as an image reconstruction algorithm. � 2019 Chitturi, Farrukh.…”
Article -
18
Digital Surface Model (DSM) Construction and Flood Hazard Simulation for Development Plans in Naga City, Philippines
Published 2007“…In this paper, there are 4 interpolation methods used, namely Australian National University's Digital Elevation Model algorithm (ANUDEM), Kriging, Polynomial and Triangulated Irregular Network (TIN). …”
Get full text
Get full text
Article -
19
Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform
Published 2009Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Compression of Three-Dimensional Terrain Data Using Lifting Scheme Based on Second Generation Wavelets
Published 2006“…The primary motivation for this work stems from the fact that there is need for a new spatial data compression technique for GIS data compression. …”
Get full text
Get full text
Thesis
