Search Results - (( java implementation learning algorithm ) OR ( topic identification using algorithm ))
Search alternatives:
- implementation learning »
- topic identification »
- identification using »
- java implementation »
- learning algorithm »
- using algorithm »
-
1
Topic identification using filtering and rule generation algorithm for textual document
Published 2015“…Most existing topic identification methods depend on occurrence of terms in the text. …”
Get full text
Get full text
Get full text
Thesis -
2
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
3
Topic identification method for textual document
Published 2017“…This paper proposes a topic identification method that filters the important terms from the preprocessed text and applied term weighting scheme to solve synonym problem.A rule generation algorithm is used to determine the appropriate topics based on the weighted terms.The text document used in the experiment is the English translated Quran.The topics identified from the proposed method were compared with topics identified using Rough Set and domain experts. …”
Get full text
Get full text
Get full text
Article -
4
Relevance detection and summarizing strategies identification algorithm using linguistic measures / Seyed Asadollah Abdiesfandani
Published 2016“…The algorithm simulates two important tasks that are frequently used by the human experts to identify summarizing strategies used to produce the summary sentences: 1) sentences relevance identification; and 2) summarizing strategies identification. …”
Get full text
Get full text
Thesis -
5
An Educational Tool Aimed at Learning Metaheuristics
Published 2020“…Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
Get full text
Get full text
Get full text
Thesis -
7
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
Get full text
Get full text
Get full text
Thesis -
8
Hybrid intelligent methods for parameter identification and load frequency control in power system
Published 2014“…The Thesis is divided into two parts in accordance to the topic. Where, in the first part, the coherent identification algorithm for single and multi-area power systems with disturbances is proposed. …”
Get full text
Get full text
Thesis -
9
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
10
-
11
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
12
-
13
A hybrid of fuzzy c-means clustering and Latent Dirichlet Allocation for analysing philanthropic corporate social responsibility activities / Nik Siti Madihah Nik Mangsor
Published 2023“…Then, text pre-processing for data cleaning was performed followed by identification of the best Latent Dirichlet Allocation (LDA) topic modelling technique that was used to integrate document clustering.…”
Get full text
Get full text
Thesis -
14
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
15
Speech processing for makhraj recognition (design adaptive filter for noise removal)
Published 2010“…Least Mean Square (LMS) Algorithm based on Adaptive Filter technique is used to remove noise. …”
Get full text
Get full text
Undergraduates Project Papers -
16
Human identification system based on moment invariant features
Published 2012“…The feature extraction is done using affine moment invariants of full body and head-shoulder of the extracted foreground objects and these were used to identify human. …”
Get full text
Get full text
Get full text
Proceeding Paper -
17
A Genetic-CBR Approach for Cross-Document Relationship Identification
Published 2012Get full text
Get full text
Get full text
Book Chapter -
18
Autonomous Camera Alignment System
Published 2017“…The most critical step in the process of identification or verification, using iris or facial recognition is the image capturing stage. …”
Get full text
Get full text
Final Year Project -
19
Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform
Published 2009Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Angle Based Protein Tertiary Structure Prediction Using Bees Optimization Algorithm
Published 2010“…WEKA program application was used for main chain angles (Phi and Psi) data classification. …”
Get full text
Get full text
Get full text
Get full text
Thesis
