Search Results - (( java implementation learning algorithm ) OR ( user realization _ algorithm ))
Search alternatives:
- implementation learning »
- java implementation »
- learning algorithm »
- user realization »
-
1
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
2
An Educational Tool Aimed at Learning Metaheuristics
Published 2020“…Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
Get full text
Get full text
Get full text
Thesis -
4
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
Get full text
Get full text
Get full text
Thesis -
5
Relationship based replication algorithm for data grid
Published 2014“…Such an approach overcomes existing algorithms that is based either on users request or resource capabilities as an individual. …”
Get full text
Get full text
Monograph -
6
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
7
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
8
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
9
Online recommendation method of Malaysian medical tourism products based on collaborative filtering algorithm
Published 2023“…Therefore, it is necessary to design a new online recommendation method for Malaysian medical tourism products based on collaborative filtering algorithm. That is to say, the Malaysian medical tourism products are modularized, the subsequent user preference similarity calculation is carried out through effective user modeling, and the online recommendation of tourism products is realized by using the collaborative filtering algorithm. …”
Get full text
Get full text
Get full text
Article -
10
Energy detection for spectrum sensing in OFDM-based cooperative and non-cooperative radio networks
Published 2018“…Moreover, the second algorithm improves the global decision through realizing the desired detection performance with low computational complexity. …”
Get full text
Get full text
Thesis -
11
Intelligent guidance parking system using modified Dijkstra's algorithm
Published 2014“…The system will automatically check for the nearest empty lot and reserve the lot for the user so that the next user will not get the same lot again. …”
Get full text
Get full text
Get full text
Article -
12
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…The system will automatically check for the nearest vacant bay and reserve it for the current user allowing a different bay reservation for the next user. …”
Get full text
Get full text
Thesis -
13
Improving spectrum efficiency on cognitive radio spectrum sensing with enhanced diversity concept / Mohsen Akbari
Published 2016“…Frequently monitoring spectrum bands is the main feature of CR networks and the other characteristic is detection of occupancy and then opportunistically usage of spectrum holes with least possible interference with primary user (PU) caused of secondary users (SUs). Users in the CR network must determine which portions of the spectrum are available, Select the best available channel, coordinate access to this channel with other users and vacate the channel when a licensed user is detected. …”
Get full text
Get full text
Thesis -
14
Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform
Published 2009Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Diagnosis of eyesight using Improved Clonal Selection Algorithm (ICLONALG) / Nor Khirda Masri
Published 2017“…This study aims to implement the classification algorithm using the Improved Clonal Selection Algorithm (ICLONALG) to classify the eyesight’s problems. …”
Get full text
Get full text
Thesis -
16
Deep Learning Based Face Attributes Recognition
Published 2018“…Combined-algorithm based optimizers plays an important role in optimizing the training algorithm. …”
Get full text
Get full text
Monograph -
17
Design Of FPGA-Based Encryption Chipusing Blowfish Algorithm
Published 2006“…In this project, the Blowfish encryption algorithm is chosen because it is among the safest algorithm used nowadays. …”
Get full text
Get full text
Monograph -
18
Robust watermarking using hand gesture for enhanced authentication
Published 2011“…As users realize the importance of security and privacy, there is a rapid increment of higher security demand in authentication systems. …”
Get full text
Get full text
Article -
19
Probabilistic ensemble fuzzy ARTMAP optimization using hierarchical parallel genetic algorithms
Published 2015“…An optimal ensemble was realized by the inter-classifier diversity of its constituents. …”
Get full text
Get full text
Get full text
Article -
20
Experimental Verification of Vehicle-to-Grid Charger for Demand Response Service
Published 2023Conference Paper
