Search Results - (( java implementation learning algorithm ) OR ( risk reduction method algorithm ))
Search alternatives:
- implementation learning »
- java implementation »
- learning algorithm »
- reduction method »
- method algorithm »
- risk reduction »
-
1
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
2
An Educational Tool Aimed at Learning Metaheuristics
Published 2020“…Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
Get full text
Get full text
Get full text
Thesis -
4
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
Get full text
Get full text
Get full text
Thesis -
5
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
6
-
7
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
8
Investigation of dimensionality reduction in a finger vein verification system
Published 2018“…Risk can be reduced by adopting direct methods that identify the person and these are generally biometric methods, such as iris, face, voice and fingerprint recognition approaches. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Finger vein verification system using repeated line tracking and dimensionality reduction using PCA algorithms with SURF matching
Published 2017“…The traditional ways that used to protect privacy such as Personal Identification Number (PIN) and smart card are getting replaced by the biometric methods due to its high risk for being forgotten and exposure. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Preprocessing Noise Reduction For Assistive Listening System
Published 2021Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
12
Surgical management of distal tibia fracture: towards an outcome-based treatment algorithm
Published 2020“…We aim to propose an algorithm for management of distal tibia fractures by evaluating the treatment options, outcomes and risk factors present. …”
Get full text
Get full text
Get full text
Get full text
Article -
13
Classification of SNPs for obesity analysis using FARNeM modelling
Published 2013“…The experimental results were compared against Correlation Feature Selection (CFS) method and ReliefF method. Classification accuracy, sensitivity, specificity, positive predictive value and negative predictive value were chosen to assess the performance of the comparison methods on error rate and validated by paired-sample T-test. …”
Get full text
Get full text
Conference or Workshop Item -
14
Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform
Published 2009Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Hexagon pattern particle swarm optimization based block matching algorithm for motion estimation / Siti Eshah Che Osman
Published 2019“…The final results have proved that HPSO algorithm could achieve 5% - 34% of computation cost reduction with satisfying degradation value of image quality. …”
Get full text
Get full text
Thesis -
16
Optimizing in-car-abandoned children’s sounds detection using deep learning algorithms / Nur Atiqah Izzati Md Fisol
Published 2023“…By proposing an alternative method to detect in-car-abandoned children's sounds with high accuracy, this research can assist authorities, including the Ministry of Transportation, in implementing effective measures to mitigate the risks associated with this pressing issue. …”
Get full text
Get full text
Student Project -
17
Radiation dose, cancer risk and diagnostic performance of computed tomography pulmonary angiography examination
Published 2021“…Hence, this study aims to evaluate the radiation dose, cancer risk and image diagnostic performance of CTPA examination regarding primary and secondary optimization such as iterative reconstruction (IR) algorithm, tube potential and pitch factor selection. …”
Get full text
Get full text
Thesis -
18
Pairwise clusters optimization and cluster most significant feature methods for anomaly-based network intrusion detection system (POC2MSF) / Gervais Hatungimana
Published 2018“…Most of researches in IDS which use k-centroids-based clustering methods like K-means, K-medoids, Fuzzy, Hierarchical and agglomerative algorithms to baseline network traffic suffer from high false positive rate compared to signature-based IDS, simply because the nature of these algorithms risk to force some network traffic into wrong profiles depending on K number of clusters needed. …”
Get full text
Get full text
Get full text
Article -
19
An enhanced supplier selection model based on optimized analytic network process towards sustainable information technology outsourcing
Published 2022“…However, existing ITO supplier selection models lack of sustainability criteria and risk factors. Moreover, these methods rely on human judgment in weight allocation. …”
Get full text
Get full text
Get full text
Thesis -
20
Structured multi-head attention stock index prediction method based adaptive public opinion sentiment vector
Published 2024“…Themean absolute percentage error (MAPE) of the proposedmethod is 0.463, a reduction of 0.294 compared to the benchmark attention algorithm. …”
Get full text
Get full text
Article
