Search Results - (( java implementation learning algorithm ) OR ( using evaluation study algorithm ))
Search alternatives:
- implementation learning »
- java implementation »
- learning algorithm »
- using evaluation »
- evaluation study »
-
1
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
Get full text
Get full text
Get full text
Thesis -
2
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
Get full text
Get full text
Get full text
Thesis -
3
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
4
An Educational Tool Aimed at Learning Metaheuristics
Published 2020“…Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
6
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
7
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
8
Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform
Published 2009Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Validation on an enhanced dendrite cell algorithm using statistical analysis
Published 2017“…This study demonstrates the mechanism of evaluating an enhanced algorithm using performance metrics and validated it using statistical analysis. …”
Get full text
Get full text
Get full text
Article -
10
Evaluation of Visual Network Algorithms on Historical Documents
Published 2020“…Therefore, for a new document, evaluation of algorithms is ineluctable. The study also proposed a simple but reliable cluster evaluation metric called NPL-C metric. …”
Get full text
Get full text
Get full text
Thesis -
11
Evaluation of Lightning Current Using Inverse Procedure Algorithm.
Published 2013“…In this study an inverse procedure algorithm is proposed in the time domain to evaluate lightning return stroke current based on measured electromagnetic fields at an observation point. …”
Get full text
Get full text
Article -
12
Unifying the evaluation criteria of many objectives optimization using fuzzy Delphi method
Published 2021“…Thus, unify a set of most suitable evaluation criteria of the MaOO is needed. This study proposed a distinct unifying model for the MaOO evaluation criteria using the fuzzy Delphi method. …”
Get full text
Get full text
Article -
13
Performance evaluation of caching placement algorithms in named data network for video on demand service
Published 2016“…There are two stages of activities resulted in the outcome of the study: The first is to determine the causes of delay performance in NDN cache algorithms used in VoD workload. …”
Get full text
Get full text
Get full text
Thesis -
14
Evaluation of MLP-ANN Training Algorithms for Modeling Soil Pore-Water Pressure Responses to Rainfall
Published 2013“…The performance of the training algorithms was evaluated using standard performance evaluation measures—root mean square error, coefficient of efficiency, and the time and number of epochs required to reach a predefined accuracy. …”
Get full text
Get full text
Citation Index Journal -
15
Tag clouds algorithm with the inclusion of personality traits
Published 2015“…In addition, a prototype was developed to evaluate the proposed algorithm. Then, user satisfaction was conducted in order to evaluate this prototype using Q-SAFI instruments. …”
Get full text
Get full text
Get full text
Thesis -
16
Comparative analysis of blockchain consensus algorithms from Shariah perspective / Tasneem Darwish … [et al.]
Published 2020“…Blockchain platforms workflow and performance are controlled by the used consensus algorithms. Although many studies evaluated cryptocurrency from the Shariah perspective, they focused only on the Cryptocurrency concept and did not consider the underlying blockchain technology. …”
Get full text
Get full text
Get full text
Article -
17
Hybrid performance measures and mixed evaluation method for data classification problems
Published 2012“…First, this study examines the use of accuracy measure as a discriminator for building an optimized Prototype Selection (PS) algorithm. …”
Get full text
Get full text
Thesis -
18
Vector Evaluated Gravitational Search Algorithm (VEGSA) for multi-objective optimization problems
Published 2012“…The proposed algorithm, which is called Vector Evaluated Gravitational Search Algorithm (VEGSA), uses a number of populations of particles. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
20
A comparative study on ant-colony algorithm and genetic algorithm for mobile robot planning.
Published 2024“…Focusing on routing optimization, the study evaluates Ant-Colony Optimization (ACO) and Genetic Algorithm (GA) in Mobile Robot Planning. …”
Get full text
Get full text
Get full text
Conference or Workshop Item
