Search Results - (( java implementation learning algorithm ) OR ( pattern using six algorithm ))
Search alternatives:
- implementation learning »
- java implementation »
- learning algorithm »
- pattern using »
- six algorithm »
- using six »
-
1
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
2
An Educational Tool Aimed at Learning Metaheuristics
Published 2020“…Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
Get full text
Get full text
Get full text
Thesis -
4
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
Get full text
Get full text
Get full text
Thesis -
5
Parallel implementation on improved error signal of backpropagation algorithm
Published 2001“…Twenty-six patterns consisting of uppercase letters from 'A' to 'Z' are tested in the experiments. …”
Get full text
Get full text
Thesis -
6
Integration of zero and sequential algorithm in shuffle exchange with Minus One Stage
Published 2013“…The algorithms consist of six algorithms namely ZeroX, ZeroY, ZeroXbit, ZeroYbit, Sequential Increasing and Sequential Decreasing algorithm. …”
Get full text
Get full text
Conference or Workshop Item -
7
Frequent Lexicographic Algorithm for Mining Association Rules
Published 2005“…The primary concept of association rule algorithms consist of two phase procedure. In the first phase, all frequent patterns are found and the second phase uses these frequent patterns in order to generate all strong rules. …”
Get full text
Get full text
Thesis -
8
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
9
Enhanced grey wolf optimisation algorithm for feature selection in anomaly detection
Published 2022“…The second modification develops a new position update mechanism using the Bat Algorithm movement. The third modification improves the controlled parameter of the MBGWO algorithm using indicators from the search process to refine the solution. …”
Get full text
Get full text
Thesis -
10
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
11
Pemahaman guru matematik Tahun Enam tentang pembahagian nombor bulat / Hoi Sim Min
Published 2018“…This study also found that teachers have four general patterns of thought and an algorithm to solve the problem of division of whole numbers, that is, the general pattern of thought of partition, measurement, repeated subtraction, the inverse of multiplication , and long division algorithm. …”
Get full text
Get full text
Get full text
Thesis -
12
Coronary artery segmentation in angiograms with pattern recognition techniques - a survey
Published 2013“…In this paper, we have divided these algorithms into five major classes and propose a survey for the main class, pattern recognition, which is a famous technique in this manner. …”
Get full text
Get full text
Conference or Workshop Item -
13
An empirical study of pattern leakage impact during data preprocessing on machine learning-based intrusion detection models reliability
Published 2023“…Data leakage, also known as pattern leakage, occurs during data preprocessing when information from the testing set is used in training, leading to overfitting and inflated accuracy scores. …”
Get full text
Get full text
Article -
14
Partitional clustering algorithms for highly similar and sparseness y-short tandem repeat data / Ali Seman
Published 2013“…Six Y-STR data sets were used as a benchmark to evaluate the performances of the algorithm against the other eight partitional clustering algorithms. …”
Get full text
Get full text
Thesis -
15
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
16
A Comparative Study Of Fuzzy C-Means And K-Means Clustering Techniques
Published 2014“…Then, we apply six datasets to measure the quality of clustering result based on the similarity measure used in the algorithm and its representation of clustering result. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Parallel implementation on improved error signal of backpropagation algorithm
Published 2002“…Data partitioning method, with columnwise block striped and batch mode weight updating strategy, is applied on the BP algorithms. Twenty-six patterns consisting of uppercase letters from ‘A’ to ‘Z’ are tested in terms of speed and recognition rates. …”
Get full text
Get full text
Get full text
Article -
18
Foldable Structures Adapted From Tessellation Origami With High Degree Of Freedom
Published 2018“…The second objective is the development of an alternative simulation approach using generative algorithm. A generative modeling tool using visual programming editor Grasshopper® which provides a more realistic simulation tool by incorporating the kinematic property of the origami was developed. …”
Get full text
Get full text
Thesis -
19
Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform
Published 2009Get full text
Get full text
Get full text
Conference or Workshop Item -
20
