Search Results - (( java implementation learning algorithm ) OR ( pattern evaluation tool algorithm ))
Search alternatives:
- implementation learning »
- java implementation »
- learning algorithm »
- pattern evaluation »
- evaluation tool »
- tool algorithm »
-
1
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
2
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
3
An Educational Tool Aimed at Learning Metaheuristics
Published 2020“…Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
Get full text
Get full text
Get full text
Thesis -
5
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
Get full text
Get full text
Get full text
Thesis -
6
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
7
Characterization of Pattern for Predicting Ultra Violet (UV) Effects in Environment Data Management System (EDMS)
Published 2013“…The result of the measurement exercises produced various patterns, each with unique identification for developing database pattern algorithm. …”
-
8
Predicting sales trends for school cooperative using Market Basket Analysis
Published 2025“…The FP-Growth algorithm was implemented to discover frequent item sets and purchasing patterns from transactional data. …”
Get full text
Get full text
Student Project -
9
Seismic attribute feasibility study for fault and fracture analysis and integration with spectral decomposition: Application in Sarawak basin
Published 2019“…However, there are some limitations in the performance of these tools, as the algorithms are dependent on the seismic survey parameters, quality of the data and its existing patterns, and geology of the study area. …”
Get full text
Get full text
Conference or Workshop Item -
10
Exploratory study of Kohonen network for human health state classification
Published 2018“…It gives good distribution for training and test patterns. Study to the variation of dataset’s size will be considered in the near future to evaluate the performance of the network.…”
Get full text
Get full text
Article -
11
Analytical method for forensic investigation of social networking applications on smartphones
Published 2016“…This will allow the investigators to detect the data remnants and identify their patterns. The identified patterns are then used to design an algorithm for detecting social networking data remnants automatically. …”
Get full text
Get full text
Get full text
Thesis -
12
Optimized multi-level elongated quinary patterns for the assessment of thyroid nodules in ultrasound images
Published 2018“…The evaluation of this CAD system on both private and public datasets confirmed its effectiveness as a secondary tool in assisting radiological findings.…”
Get full text
Get full text
Article -
13
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
14
Machine Learning Applications in Offense Type and Incidence Prediction
Published 2024“…To mitigate the impact of these harmful actions, it is crucial to identify and address them promptly and effectively. This study evaluates specific patterns of detrimental behaviour using data from Kaggleto predict and analyzeprevalent negative behaviours. …”
Get full text
Get full text
Get full text
Article -
15
A new mobile malware classification for call log exploitation
Published 2024journal::journal article -
16
FEATURES EXTRACTION OF HEP-2 IMMUNOFLUORESCENCE PATTERNS BASED ON TEXTURE AND REGION OF INTEREST TECHNIQUES
Published 2013“…Next, to design an algorithm that can automatically identify the 2 patterns of the HEp-2 cell tested using ANA. …”
Get full text
Get full text
Final Year Project -
17
Improved flower pollination optimization algorithm based on swap operator and dynamic switch probability selection
Published 2023“…Furthermore, it is hybridized with the Pattern Search algorithm to ensure the optimality of the solution. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
18
The effect of job satisfaction on the relationship between organizational culture and organizational performance
Published 2023“…Furthermore, it is hybridized with the Pattern Search algorithm to ensure the optimality of the solution. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
19
Concrete surface inspection by using Unmanned Aerial Vehicle (UAVs) and deep learning algorithms Yolov7
Published 2024“…This research aims to evaluate the detection and analysis of cracks on concrete surfaces by utilizing Uavs and Yolo algorithms. …”
Get full text
Get full text
Conference or Workshop Item -
20
Application of machine learning and artificial intelligence in detecting SQL injection attacks
Published 2024“…The study uses a mixed-methods approach to evaluate how well different AI and ML algorithms identify SQL injection attacks by combining algorithmic evaluation with empirical investigation. …”
Get full text
Get full text
Get full text
Article
