Search Results - (( java implementation learning algorithm ) OR ( pattern perceptions machine algorithm ))
Search alternatives:
- implementation learning »
- java implementation »
- pattern perceptions »
- learning algorithm »
- machine algorithm »
-
1
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
2
Design of a pattern classification system using extreme learning machine
Published 2024text::Final Year Project -
3
Design of a pattern classification system using extreme learning machine
Published 2023text::Final Year Project -
4
Prediction of sleep pattern for university students using machine learning
Published 2026“…This study aims to predict sleep patterns among university students using machine learning techniques, focusing on the classification of regular and irregular sleep behaviors. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
-
6
An Educational Tool Aimed at Learning Metaheuristics
Published 2020“…Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
Get full text
Get full text
Get full text
Thesis -
8
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
Get full text
Get full text
Get full text
Thesis -
9
Application of the bees algorithm to the selection features for manufacturing data
Published 2007Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
11
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
12
Mel Frequency Cepstral Coefficient (MFCC) extraction for speaker identification on FPGA
Published 2009Get full text
Working Paper -
13
Handgrip strength evaluation using neuro fuzzy approach
Published 2010“…The purpose of this study is to collect handgrip strength of patients and distinguish them from the normal persons. Multilevel Perception neural network utilizes the back-propagation learning algorithm is suitable to discover relationships and patterns in the dataset. …”
Get full text
Get full text
Article -
14
Optimization of abrasive machining of ductile cast iron using water based SiO2 nanocoolant : a radial basis function
Published 2012“…Artificial neural network (ANN) model is developed for predicting the results of the surface roughness and MRR. Multi-Layer Perception (MLP) along with batch back propagation algorithm are used. …”
Get full text
Get full text
Undergraduates Project Papers -
15
Auto raise hand in Microsoft teams (API/Extension)
Published 2023“…Artificial Intelligence focuses on developing intelligences of machines, by developing algorithms, machines are able to learn from data and patterns, even perform tasks that require human intelligence, such as visual perception, speech recognition, and decision-making. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
16
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
17
Advancing literary analysis with Python: a comprehensive study of simile detection and classification in the translation of Al-Abrat
Published 2025“…Key findings reveal distinct patterns in simile usage, particularly the prevalence of perceptible-perceptible and cognitive-cognitive categories, emphasizing the role of figurative language in fostering thematic and emotional engagement. …”
Get full text
Get full text
Get full text
Article -
18
Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform
Published 2009Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Artificial neural network modeling of grinding of ductile cast iron using water based sio2 nanocoolant
Published 2014“…An artificial neural network model is developed for predicting the surface roughness and MRR. Multi-layer perception and a batch back propagation algorithm are used. …”
Get full text
Get full text
Get full text
Article -
20
Watermarking technique based on ISB (Intermediate Significant Bit)
Published 2010“…It inserts a perceptually transparent pattern called watermark in an image called host or cover using an embedding algorithm. …”
Get full text
Get full text
Proceeding Paper
