Search Results - (( java implementation learning algorithm ) OR ( proposed implementation drops algorithm ))
Search alternatives:
- implementation learning »
- proposed implementation »
- implementation drops »
- java implementation »
- learning algorithm »
-
1
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
2
IWDSA: a hybrid Intelligent Water Drops with a Simulated Annealing for the localization improvement in wireless sensor networks
Published 2024“…The proposed algorithm, named Intelligent Water Drops with Simulated Annealing (IWDSA), combines two powerful optimization methods: Intelligent Water Drops (IWD) and Simulated Annealing (SA). …”
Get full text
Get full text
Get full text
Article -
3
Experimental implementation controlled SPWM inverter based harmony search algorithm
Published 2017“…Then, the control algorithm of the inverter prototype is experimentally implemented using the eZdsp F28355 board along with the bipolar sinusoidal pulse width modulation (SPWM) to control the output voltage drop under different load conditions. …”
Get full text
Get full text
Get full text
Article -
4
Immune-based technique for undergraduate programmes recommendation / Muhammad Azrill Mohd Zamri
Published 2017“…The proposed technique is obtained by combining artificial immune network (aiNET) and clonal selection algorithm (CLONALG). …”
Get full text
Get full text
Thesis -
5
An Educational Tool Aimed at Learning Metaheuristics
Published 2020“…Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
Get full text
Get full text
Get full text
Thesis -
7
Implementation of Biological Sprouting Algorithm for NoC Fault Tolerance
Published 2013Get full text
Get full text
Conference or Workshop Item -
8
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
Get full text
Get full text
Get full text
Thesis -
9
Experimental implementation controlled SPWM inverter based harmony search algorithm
Published 2023Article -
10
DEVELOPMENT OF NODE RELIABILITY DETECTION ALGORITHM FOR WIRELESS SENSOR NETWORKS
Published 2014“…The proposed algorithm is then implemented on hardware compounding of several IRIS sensor motes. …”
Get full text
Get full text
Final Year Project -
11
DEVELOPMENT OF NODE RELIABILITY DETECTION ALGORITHM FOR WIRELESS SENSOR NETWORKS
Published 2014“…The proposed algorithm is then implemented on hardware compounding of several IRIS sensor motes. …”
Get full text
Get full text
Final Year Project -
12
Performance Comparison of Packet Queuing Algorithm in Wireless Networks
Published 2014“…Therefore, a good strategy of packet queuing algorithm is very important to avoid packets drop. …”
Get full text
Get full text
Article -
13
Performance Comparison of Packet Queuing Algorithm in Wireless Networks
Published 2014“…Therefore, a good strategy of packet queuing algorithm is very important to avoid packets drop. …”
Get full text
Get full text
Conference or Workshop Item -
14
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
15
Wormhole attack detection mechanism in mobile ad hoc network using neighborhood information and path tracing algorithm
Published 2015“…In this study, a new defence mechanism is proposed based on modification of the packet forwarding process, using Neighborhood Information (NI) and PT algorithm, and known as NIPT algorithm. …”
Get full text
Get full text
Thesis -
16
Token based path allocation approach for mobile robots in sorting centre for achieving high throughput
Published 2024“…Also, a layout is proposed that implements ring road and/or central road concept which allow these robots to travel using these roads without passing the main road that links to the pick-up and drop-off areas.. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
17
Quranic Cross-Lingual Information Retrieval Optimization using Hexadecimal Conversion Algorithm
Published 2024“…This article highlights the proposed Quranic Cross-Lingual Information Retrieval (Q-CLIR) model and Hexadecimal Conversion Algorithm. …”
Article -
18
Automated traffic counting data collection and analysis
Published 2021“…There have been many methods of traffic data collection proposed and implemented over the years, each with their own pros and cons. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
19
A VOICE PRIORITY QUEUE (VPQ) SCHEDULER FOR VOIP OVER WLANs
Published 2011“…The objectives of this thesis are to propose a new scheduler and algorithms that support the VoIP application and to evaluate, validate and verify the newly proposed scheduler and algorithms with the existing scheduling algorithms over WLANs through simulation and experimental environment. …”
Get full text
Get full text
Thesis -
20
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis
