Search Results - (( java implementation learning algorithm ) OR ( using model linking algorithm ))
Search alternatives:
- implementation learning »
- java implementation »
- learning algorithm »
- linking algorithm »
- using model »
-
1
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
2
An Educational Tool Aimed at Learning Metaheuristics
Published 2020“…Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
Get full text
Get full text
Get full text
Thesis -
4
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
Get full text
Get full text
Get full text
Thesis -
5
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
6
-
7
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
8
Implementation of PID based controller tuned by Evolutionary Algorithm for Double Link Flexible Robotic Manipulator
Published 2018“…The system managed to reach desired angle for both hub at lower overshoot using proposed method. Meanwhile, the vibration reduction shows great improvement for both link 1 and 2. …”
Get full text
Get full text
Get full text
Proceeding -
9
Genetic algorithm optimisation for fuzzy control of wheelchair lifting and balancing
Published 2009“…A virtual wheelchair (WC) model is developed within Visual Nastran (VN) software environment where the model is further linked with Matlab/Simulink for control purposes. …”
Get full text
Get full text
Get full text
Proceeding Paper -
10
Hub Angle Control for A Single Link Flexible Manipulator Based on Cuckoo Search Algorithm
Published 2021“…Initially, the system was modelled using input and output experimental data of the hub angle. …”
Get full text
Get full text
Get full text
Proceeding -
11
Training functional link neural network with ant lion optimizer
Published 2020“…Functional Link Neural Network (FLNN) has becoming as an important tool used in machine learning due to its modest architecture. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Intelligent Model for Endpoint Accelerations of Two link Flexible Manipulator Using a Deep Learning Neural Network
Published 2022“…Since coupling impact was assumed to be minimised, the characterizations of TLFM were defined independently in each model. Two discrete SISO models of a flexible two link manipulator were developed using the torque input and the endpoint accelerations of each link. …”
Get full text
Get full text
Proceeding -
13
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
14
Design of information hiding algorithm for multi-link network transmission channel
Published 2019“…This paper designs an information hiding algorithm for multi-link network transmission channel based on secondary positioning, it uses RS code M public key cryptosystem to pre-process secret information and improve the security of information; calculates the upper limit of hiding capacity of multi-link network transmission channel system through information hiding capacity analysis model, and determines whether the hiding capacity exceeds the secret information. …”
Get full text
Get full text
Get full text
Article -
15
Comparative analysis of spiral dynamic algorithm and artificial bee colony optimization for position control of flexible link manipulators
Published 2024“…Interestingly, the manipulator's behaviours using the spiral dynamics algorithm for PID controller tuning were superior to those using alternative methods. …”
Get full text
Get full text
Get full text
Article -
16
Job position prediction based on skills and experience using machine learning algorithm / Ezaryf Hamdan
Published 2024“…This paper proposes a sophisticated Job Position Prediction system utilizing Machine Learning algorithms and leveraging data from LinkedIn profiles. …”
Get full text
Get full text
Thesis -
17
-
18
A design of redirect link failure protocol based on dynamic source routing for mobile ad hoc networks
Published 2011“…Therefore, to avoid this situation, we propose an extension of DSR protocol called Redirect Link Failure Protocol (RLFP) in order to solve link failure problem and update routes in the route cache of DSR protocol.RLFP consists of three parts.The first part is based on Link Prediction Algorithm, which utilises signal power strength from the received packets to predict the link before any break down happens.The second part is based on Link Solution Model, which contains sub-models that can solve and redirect link failure.Finally, the Enhanced Route Cache Model, which possesses a scheme that is called “Updating Route Scheme”, to avoid stale routes.…”
Get full text
Get full text
Get full text
Get full text
Monograph -
19
Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform
Published 2009Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Comparison between multi-objective and single-objective optimization for the modeling of dynamic systems
Published 2013Get full text
Working Paper
