Search Results - (( java implementation learning algorithm ) OR ( patterns using self algorithm ))
Search alternatives:
- implementation learning »
- java implementation »
- learning algorithm »
- patterns using »
- self algorithm »
-
1
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
2
An Educational Tool Aimed at Learning Metaheuristics
Published 2020“…Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
Get full text
Get full text
Get full text
Thesis -
4
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
Get full text
Get full text
Get full text
Thesis -
5
Image recognition using Artificial Immune systems approach
Published 2009Get full text
Working Paper -
6
Deterministic Automatic Test Pattern Generation for Built-In Self Test System
Published 2006“…To illustrate that, the DATPG algorithm for digital combinational circuit using VHDL language is designed to generate the test patterns. …”
Get full text
Get full text
Thesis -
7
BIOLOGICAL INSPIRED INTRUSION PREVENTION AND SELF-HEALING SYSTEM FOR CRITICAL SERVICES NETWORK
Published 2011“…Using the software system, design theories, AIS features, new nonlinear classification algorithm, and self-healing system show how the use of presented systems can ensure safety for critical services networks and heal the damage caused by intrusion. …”
Get full text
Get full text
Thesis -
8
Swarm negative selection algorithm for electroencephalogram signals classification
Published 2009“…Thus, adapted negative selection is employed to create a set of self-tolerant ALCs. Whereas, PSO is used to evolve these ALCs away from self patterns towards non-self space and to maintain diversity and generality among the ALCs. …”
Get full text
Article -
9
Automatic generation of user-defined test algorithm description file for memory BIST implementation
Published 2022“…Memory built-in self-test (BIST) is a widely used technique to allow the self-test and self-checking of the embedded memories on chips after the fabrication process. …”
Get full text
Get full text
Get full text
Article -
10
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
11
Exploring High Resolution Test Pattern To Improve The Cache Failure Analysis
Published 2017“…Typically, only pass/fail basis test algorithm is being used to test the cache array in silicon devices. …”
Get full text
Get full text
Thesis -
12
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
13
Multilevel learning in Kohonen SOM network for classification problems
Published 2006“…Classification is one of the most active research and application areas of neural networks. Self-organizing map (SOM) is a feed-forward neural network approach that uses an unsupervised learning algorithm has shown a particular ability for solving the problem of classification in pattern recognition. …”
Get full text
Get full text
Thesis -
14
-
15
Content adaptive fast motion estimation based on spatio-temporal homogeneity analysis and motion classification
Published 2012“…This is the basis of the proposed algorithm. The proposed algorithm involves a multistage approach that includes motion vector prediction and motion classification using the characteristics of video sequences. …”
Get full text
Get full text
Get full text
Article -
16
Built in self test for RAM using VHDL
Published 2013“…Modelsim-Altera 6.4a is the software that used to generate every single module of the Built-in-Self-Test (BIST) for Random access Memory (RAM) architecture. …”
Get full text
Get full text
Get full text
Article -
17
Hybrid self organizing map for overlapping clusters
Published 2008“…The Kohonen self organizing map is an excellent tool in exploratory phase of data mining and pattern recognition. …”
Get full text
Get full text
Article -
18
Object with symmetrical pattern recognition with dynamic size filter
Published 2011“…The solutions need no camera calibration because the system has self-calibration effect since the area of interest had modelled using a set of algorithms by an array of visible features on it and not by it environment. …”
Get full text
Get full text
Conference or Workshop Item -
19
APPLICATION OF LINK GRAMMAR IN SEMI-SUPERVISED NAMED ENTITY RECOGNITION FOR ACCIDENT DOMAIN
Published 2011“…In our research, extraction pattern from the first module will be fed to this algorithm and is used to make the prediction of named entity candidate category. …”
Get full text
Get full text
Thesis -
20
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise
