Search Results - (( java implementation learning algorithm ) OR ( using integration detection algorithm ))
Search alternatives:
- implementation learning »
- integration detection »
- java implementation »
- learning algorithm »
- using integration »
-
1
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
2
An Educational Tool Aimed at Learning Metaheuristics
Published 2020“…Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
Get full text
Get full text
Get full text
Thesis -
4
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
Get full text
Get full text
Get full text
Thesis -
5
Integrating genetic algorithms and fuzzy c-means for anomaly detection
Published 2005Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Integration of image processing algorithm and deep learning approaches to monitor ginger plant
Published 2024“…This study aims to integrate image processing and deep learning algorithms to monitor the growth of ginger plants. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
7
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
8
Artificial intelligent integrated into sun-tracking system to enhance the accuracy, reliability and long-term performance in solar energy harnessing
Published 2022“…The proposed AI algorithm integrates two deep learning models which are object detection algorithm and reinforcement learning. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
9
Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak
Published 2019“…This creates the jamming detection and classification parameters. The second stage is detecting jammers by integrating both lower layers by developing Integrated Combined Layer Algorithm (ICLA). …”
Get full text
Get full text
Thesis -
10
Integration of image processing algorithm and deep learning approaches to monitor ginger plant
Published 2024“…This study aims to integrate image processing and deep learning algorithms to monitor the growth of ginger plants. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
11
Integration of Image Processing Algorithm and Path Planning for Search and Rescue Robot
Published 2017“…The focus of this project was to explore algorithms and techniques used in motion detection, object recognition and facial recognition, path finding as well as obstacle avoidance. …”
Get full text
Get full text
Final Year Project -
12
-
13
Integrated face and facial components detection
Published 2015Get full text
Get full text
Conference or Workshop Item -
14
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
15
Microcrack Detection And Noise Reduction In Integrated Circuit Packages
Published 2018“…However, this method is time consuming due to the multiple configurations needed to be tuned and is also susceptible to image noise which lowers the accuracy of the detected microcracks. Therefore, a better algorithm is desired to improve the detection performance in terms of time and accuracy. …”
Get full text
Get full text
Monograph -
16
ATM crime detection using image processing integrated video surveillance : a systematic review
Published 2019“…The findings of this review may help the future researchers to develop dynamic and multipurpose algorithms for surveillance system that can detect and prevent ATM crime.…”
Get full text
Get full text
Get full text
Article -
17
An integrated deep learning deepfakes detection method (IDL-DDM)
Published 2024“…Consequently, such manipulation via intelligent algorithm contributes to more crucial circumstances as electronic media integrity become a challenging concern. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
Cooperative source detection using an optimized distributed levy flight algorithm
Published 2023“…Additionally, to integrate cooperative behavior, an artificial attractive force is used to maintain communication among the agents. …”
Get full text
Get full text
Get full text
Article -
19
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
20
SVM for network anomaly detection using ACO feature subset
Published 2016“…KDD99, which is a benchmark dataset used for anomaly detection, has been adopted here. …”
Get full text
Get full text
Conference or Workshop Item
