Search Results - (( java implementation learning algorithm ) OR ( data validation matching algorithm ))
Search alternatives:
- implementation learning »
- java implementation »
- validation matching »
- learning algorithm »
- data validation »
-
1
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
2
An Educational Tool Aimed at Learning Metaheuristics
Published 2020“…Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
Get full text
Get full text
Get full text
Thesis -
4
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
Get full text
Get full text
Get full text
Thesis -
5
-
6
New filtering framework for web personalization search / Anitawati Mohd Lokman and Aishah Ahmad
Published 2012“…The first survey is for data collection and the second survey is for validation of the filtering framework. …”
Get full text
Get full text
Research Reports -
7
Fuzzy Systems and Bat Algorithm for Exergy Modeling in a Gas Turbine Generator
Published 2011“…The data for model training and validation are generated using semi-empirical models developed by the authors. …”
Get full text
Conference or Workshop Item -
8
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
9
Approach For Optimizing Course Recommendation Based On Integrating Modified Felder-Silverman Learning Style Model With Meta-Heuristics Algorithm
Published 2023“…This research streamlines course selection by matching it with learners' styles. It involves identifying potential courses learning style, validated through genetic and surrogate meta-heuristics optimization algorithms, and employing Felder-Silverman model for learning style identification. …”
Get full text
Get full text
Thesis -
10
Moving objects detection from UAV captured videos using trajectories of matched regional adjacency graphs
Published 2017“…Precision and recall are used as the criteria to quantitatively evaluate and validate overall MOD performance. Furthermore, both are computed with respect to the ground-truth data which are manually annotated for the video sequences. …”
Get full text
Get full text
Get full text
Thesis -
11
CONTEXT AWARE TRAFFIC SCHEDULING ALGORITHM FOR COMMUNICATION SYSTEM IN POWER DISTRIBUTION NETWORK
Published 2023“…The simulation results from NS-3 is validated with the results obtained from MATLAB. It proves that the contextual aware ranking of each traffic are correctly matched to one another. …”
text::Thesis -
12
Implementation of perez-dumortier calibration algorithm
Published 2014“…The implementation example uses irradiance-matched technique by i-SMARTS radiative transfer code to derive corresponding reference AOD for validation purposes. …”
Get full text
Get full text
Get full text
Chapter In Book -
13
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
14
Sizing algorithm for stand-alone AC coupled Hybrid PV-diesel power system under Malaysian climate / Nor Syafiqah Syahirah Mohamed
Published 2016“…The result of the proposed algorithm is compared and validates with the system data from actual installed PV hybrid system in Sabah based on performance indices specified in Malaysian Standard MS IEC 61724: 2010. …”
Get full text
Get full text
Thesis -
15
Privacy-preserving multi-keyword hybrid search over encrypted data in cloud
Published 2022“…This algorithmic combination is able to predict the privacy ranking measure of the retrieved data. …”
Get full text
Get full text
Article -
16
Prediction of football club winning rate using Bayesian model algorithm / Adam Khairul Anuar
Published 2023“…Recommendations include continuous model training, detailed features, collaboration with experts, and exploring alternative algorithms. In essence, this research contributes to football analytics, offering a reliable Bayesian model for match outcome prediction.…”
Get full text
Get full text
Thesis -
17
Wifi4U: Broadband recommendation system by using rule-based and cosine similarity / Putri Nur Syarfa Maizan
Published 2020“…In this system, Forward Chaining in Rule-Based algorithm is used to filter user’s preferences and Web-Scraping technique is used to extract data and information from websites. …”
Get full text
Get full text
Thesis -
18
Privacy-preserving multi-keyword hybrid search over encrypted data in cloud
Published 2022“…This algorithmic combination is able to predict the privacy ranking measure of the retrieved data. …”
Get full text
Get full text
Article -
19
Algorithm for the legal regulation of internet financial crime
Published 2024“…Similarly, association rules showed a strong correlation between the test and experimental samples, further validating the predictive capabilities of the algorithms. …”
Get full text
Get full text
Get full text
Article -
20
Validation process for electrical charge tomography system using digital imaging technique
Published 2009“…Numerical analysis result based on data measured by sensor indicates that the algorithm is efficient to overcome the numerical instability. …”
Get full text
Get full text
Get full text
Article
