Search Results - (( java implementation learning algorithm ) OR ( rate detection path algorithm ))

Refine Results
  1. 1

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3
  4. 4

    Identification and mitigation of non-line-of-sight path effect using repeater for hybrid ultra-wideband positioning and networking system by Chung, Gwo Chin, Mohd. Aqmal Syafiq Kamarudin, Lee, It Ee, Tan, Soo Fun

    Published 2021
    “…Hence, a higher probability of accuracy across the entire tested area can be achieved for the UWB positioning system by mitigating the NLOS path effect using the proposed algorithm. Besides that, the transmission of the line-of-sight (LOS) signal attains a data rate of around 15 times higher than the NLOS signal at a bit-error-rate (BER) of 10-5 in the indoor networking system. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    An Educational Tool Aimed at Learning Metaheuristics by Kader, Md. Abdul, Jamaluddin, Jamal A., Kamal Z., Zamli

    Published 2020
    “…Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment by Ruzita, Ahmad

    Published 2013
    “…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Detection of black hole nodes in mobile ad hoc network using hybrid trustworthiness and energy consumption techniques by Mustafa, Ahmed Sudad

    Published 2017
    “…On the other hand, the detection algorithm based on the energy consumption achieves PDR of 91.6%, EED of 14.03 ms and detection rate accuracy of 93%. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Animal voice recognition for identification (ID) detection system by Yeo, Che Yong, Syed Mohamed, Syed Abdul Rahman Al-Haddad, Ng, Chee Kyun

    Published 2011
    “…In this paper, an animal identification (ID) detection system based on animal voice pattern recognition algorithm has been developed. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Dog voice identification (ID) for detection system by Yeo, Che Yong, Syed Mohamed, Syed Abdul Rahman Al-Haddad, Ng, Chee Kyun

    Published 2012
    “…In this paper, an animal identification (ID) detection system based on animal voice pattern recognition algorithm has been developed. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11
  12. 12

    Novel Link Establishment Communication Scheme against Selfish Attack Using Node Reward with Trust Level Evaluation Algorithm in MANET by Hemalatha, S., Kshirsagar, P.R., Manoharan, H., Vasantha Gowri, N., Vani, A., Qaiyum, S., Vijayakumar, P., Tirth, V., Haleem, S.L.A., Chakrabarti, P., Teressa, D.M.

    Published 2022
    “…Lower trust level node is selfish node and they are detected and ignored from path. It increases the lifespan of network and throughput and minimizes the end to end delay and energy consumption. …”
    Get full text
    Get full text
    Article
  13. 13

    Attack prediction to enhance attack path discovery using improved attack graph by Al-Araji, Zaid Jasim, Abdullah, Raihana Syahirah, Syed Ahmad, Sharifah Sakinah

    Published 2022
    “…For the attack graph analysis, the random forest algorithm was used to detect, predict, and dynamically ascertain the attack location in the network. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Attack graph construction for enhancing intrusion prediction based on vulnerabilities metrics by Al-Araji, Zaid Jasim Mohammed

    Published 2023
    “…These metrics use network resources to determine the number of vulnerabilities and the network's weakest path. This work aims to generate a faster and less complexity attack graph and enhance the attack graph analysis to improve the detection and prediction of the attack, the attack's next step, and discover the weakest path that an attacker might use. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    A hybrid rate control mechanism for forwarding and congestion control in named data network by Alsamman, Mohammed Gamal

    Published 2020
    “…Named Data Networking (NDN) is an emerging Internet architecture that employs a pull-based, in-path caching, hop-by-hop, and multi-path transport architecture. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    IMPLEMENTATION OF BEHAVIOUR BASED NAVIGATION IN A PHYSICALLY CONFINED SITE by ABDUL RAZAK, NUSRAH

    Published 2017
    “…Selected basic behaviour-based algorithms such as wallfollower, obstacle avoidance, escape route and target detection are to be combined and its efficiency is measured. …”
    Get full text
    Get full text
    Final Year Project
  17. 17

    Obstacle detection for Unmanned Aerial Vehicle (UAV) by Abdul Khaliq, Nor Aizatul Nabila, Ramli, Muhammad Faiz

    Published 2022
    “…In real-time experiment, the success rate for good texture (40%), poor texture (55%) and texture-less (45%) The findings indicate that the recommended method works well for detecting textures-less obstacle even though the success rate is only 40% because out of 10 test only one test is fail on detecting free region. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Development of a prototype solar-powered autonomous vehicle prototype with object detection and avoidance system using Raspberry-Pi by Ogonye, O. Solomon, Dagwa Ishaya Musa, Nurudeen Abdulhakeem Hassan, Okonkwo, Emmanuel, Kulutuye, Precious

    Published 2024
    “…The vehicle uses ultrasonic sensors and a USB webcam to detect and avoid obstacles on its path with the aid of a Raspberry Pie program that effectively executes decision-making changes to manoeuvre the vehicle away from objects on a free path. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Development of a State-Space Observer for Active Noise Control Systems by Muhssin, Mazin T.

    Published 2009
    “…The criterions of success considered the evaluation process are the length of the propagation path, level of cancellation, convergence rate, number of modes of each path, and destructive interferences occur at the cancellation path. …”
    Get full text
    Get full text
    Thesis