Search Results - (( java implementation learning algorithm ) OR ( pattern reduction detection algorithm ))
Search alternatives:
- implementation learning »
- java implementation »
- reduction detection »
- learning algorithm »
- pattern reduction »
-
1
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
2
An Educational Tool Aimed at Learning Metaheuristics
Published 2020“…Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
Get full text
Get full text
Get full text
Thesis -
4
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
Get full text
Get full text
Get full text
Thesis -
5
P300 detection of brain signals using a combination of wavelet transform techniques
Published 2012“…By reduction of recording EEG channels in the single trial based algorithms, the processing time of P300 detection decrease dramatically. …”
Get full text
Get full text
Thesis -
6
Accelerating FPGA-surf feature detection module by memory access reduction
Published 2019“…We also found that the SURF algorithm memory access has redundant repeating pattern that can be reduced. …”
Get full text
Get full text
Get full text
Article -
7
Rough Neural Networks Architecture For Improving Generalization In Pattern Recognition
Published 2004“…The algorithm enhances the recognition ability of the system compared to manual extraction and labeling of pattern classes. …”
Get full text
Get full text
Thesis -
8
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…In email spam detection, not only different parts and content of emails are important, but also the structural and special features of these emails have effective rule in dimensionality reduction and classifier accuracy. …”
Get full text
Get full text
Thesis -
9
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
10
Rough Set Discretize Classification of Intrusion Detection System
Published 2016“…Many pattern classification tasks confront with the problem that may have a very high dimensional feature space like in Intrusion Detection System (IDS) data. …”
Get full text
Get full text
Get full text
Article -
11
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
12
Improved undetected error probability model for JTEC and JTEC-SQED coding schemes
Published 2013“…According to the decoding algorithm the errors are classified into patterns and their decoding result is checked for failures. …”
Get full text
Get full text
Conference or Workshop Item -
13
Pairwise clusters optimization and cluster most significant feature methods for anomaly-based network intrusion detection system (POC2MSF) / Gervais Hatungimana
Published 2018“…Anomaly-based Intrusion Detection System (IDS) uses known baseline to detect patterns which have deviated from normal behaviour. …”
Get full text
Get full text
Get full text
Article -
14
Identifying diseases and diagnosis using machine learning
Published 2023“…It uses are many dimensionality reduction algorithms and classification algorithms. …”
Article -
15
Low area Programmable Memory Built-In Self-Test (PMBIST) for small embedded ram cores / Nur Qamarina Mohd Noor
Published 2013“…The memory BIST applies various test algorithms such as MARCH tests to detect various RAM faults. …”
Get full text
Get full text
Thesis -
16
Effect of masking techniques on computational complexity reduction of scale invariant feature transform
Published 2015“…The Scale Invariant Feature Transform (SIFT) is algorithm use in feature detection and description, it is famous and has dominated the research community. …”
Get full text
Get full text
Thesis -
17
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
18
Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform
Published 2009Get full text
Get full text
Get full text
Conference or Workshop Item -
19
A new model for iris data set classification based on linear support vector machine parameter's optimization
Published 2020“…Data mining is known as the process of detection concerning patterns from essential amounts of data. …”
Get full text
Get full text
Get full text
Article -
20
Local-based stereo matching algorithm using multi-cost pyramid fusion, hybrid random aggregation and hierarchical cluster-edge refinement
Published 2023“…The estimation of Stereo Matching Algorithm (SMA) is one of the extensive research topics for obtaining the disparity map from two images. …”
Get full text
Get full text
Get full text
Thesis
