Search Results - (( java implementation learning algorithm ) OR ( program users connection algorithm ))
Search alternatives:
- implementation learning »
- connection algorithm »
- java implementation »
- learning algorithm »
- users connection »
- program users »
-
1
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
2
-
3
An Educational Tool Aimed at Learning Metaheuristics
Published 2020“…Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
Get full text
Get full text
Get full text
Thesis -
5
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
Get full text
Get full text
Get full text
Thesis -
6
Communication module for urban vehicle two-way connection monitoring device: article / Ahmad Kamil Mohamad Yunus
Published 2015“…The action module will cover GPS, GSM, GPRS and camera triggering and interfacing, controlled by an algorithm programmed to suitable microcontroller platform. …”
Get full text
Get full text
Article -
7
Communication module for urban vehicle two-way connection monitoring device / Ahmad Kamil Mohamad Yunus
Published 2015“…The action module will cover GPS, GSM, GPRS and camera triggering and interfacing, controlled by an algorithm programmed to suitable microcontroller platform. …”
Get full text
Get full text
Thesis -
8
OFF-GRID SOLAR PHOTOVOLTAIC (PV) DESIGN BASED ON FUZZY TECHNIQUE FOR ORDER PERFORMANCE BY SIMILARITY TO IDEAL SOLUTION (TOPSIS) APPROACH
Published 2022“…PV technology comprises the grid-connected PV systems and off-grid PV systems. Off-grid PV systems generate and distribute electrical energy independently, unlike the grid-connected PV systems. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
9
Resource allocation techniques for downlink Non-Orthogonal Multiple Access-Based 5G wireless systems
Published 2021“…The results show that the femtocell user’s minimum energy efficiency by applying NOMA with power allocation method using Sequential Convex Programming and user pairing based on Greedy Algorithm (NOMA-SCP-GA) is higher by 38.22 %, 58.84 %, and 76.39 % compared to NOMA-DC, NOMA-FTPA, and OFDMA methods respectively. …”
Get full text
Get full text
Thesis -
10
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
11
Effects of Authentication of Users in Mobile Internet Protocol Version 6
Published 2004“…The password system is also recommended as a viable solution for this authentication as its implementation is most convenient for mobile users. A password algorithm is proposed from which a program can be written in any language deemed suitable.…”
Get full text
Get full text
Thesis -
12
Transition and Motion Sensing System with Nintendo Wiimote and Infra-Red LEDs Array
Published 2023Conference Paper -
13
Parameter estimation of multivariable system using Fuzzy State Space Algorithm / Razidah Ismail … [et al.]
Published 2011“…In order to enhance the implementation of the algorithm, it is necesssary to develop an efficient computation program together with the user's interface. …”
Get full text
Get full text
Research Reports -
14
Novice programmers’ emotion and competency assessments using machine learning on physiological data / Fatima Jannat
Published 2022“…The result implies a good connection between how a novice programmer goes through a programming problem and his/her emotional arousal at that moment. …”
Get full text
Get full text
Get full text
Thesis -
15
Helperconnect / Leviana Andrew ... [et al.]
Published 2024“…By utilizing a robust matching algorithm, users can find assistance tailored to their specific needs. …”
Get full text
Get full text
Book Section -
16
Cognitive selection mechanism performance in IEEE 802.11 WLAN
Published 2013“…The enhancement reaped from the developed selection algorithm is expected to bring benefit to different user at various places…”
Get full text
Get full text
Get full text
Article -
17
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
18
-
19
A platform to develop a secure instant messaging using jabber protocol
Published 2010Get full text
Article -
20
Security mechanism for wireless Mobile Ad Hoc Networks (MANET)
Published 2006“…It advantages is include the speed of connection setup, and ease of removal of services or users. …”
Get full text
Get full text
Student Project
