Search Results - (( java implementation learning algorithm ) OR ( using scheme based algorithm ))
Search alternatives:
- implementation learning »
- java implementation »
- learning algorithm »
- using scheme »
- scheme based »
-
1
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
2
An Educational Tool Aimed at Learning Metaheuristics
Published 2020“…Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
Get full text
Get full text
Get full text
Thesis -
4
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
Get full text
Get full text
Get full text
Thesis -
5
-
6
-
7
Quality of service management algorithms in WiMAX networks
Published 2015“…This scheme determines an admission criteria based on scheduling service classes. …”
Get full text
Get full text
Thesis -
8
Prediction and multi-criteria-based schemes for seamless handover mechanism in mobile WiMAX networks
Published 2013“…In the proposed HATSC scheme, the AHP method is uese for criteria weighting, while the TOPSIS method uses for the selection technique based on a multi-criteria decision-making algorithm is proposed. …”
Get full text
Get full text
Thesis -
9
Summary of best efficient algorithms on cognitive radio cooperative spectrum sensing to improve QoS
Published 2014“…In addition, the ICA-based scheme also indicates promising convergence and time running performance as compared to other schemes.…”
Get full text
Get full text
Conference or Workshop Item -
10
Secure Hybrid Scheme For Securing Mqtt Protocol Based On Enhanced Symmetric Algorithm
Published 2023“…A secure hybrid scheme introduces a new design architecture of the symmetric AES algorithm to encrypt the MQTT payload called “D-AES”. …”
Get full text
Get full text
Thesis -
11
Application Of Higher Order Compact Finite Difference Methods To Problems In Fluid Dynamics
Published 2003“…Third, only the numerical algorithm based on Hermitian scheme is used to solve the flow past a backward-facing step. …”
Get full text
Get full text
Thesis -
12
A reinforcement learning-based energy-efficient spectrum-aware clustering algorithm for cognitive radio wireless sensor network
Published 2016“…Performance comparisons of the RL based clustering scheme with Groupwise spectrum-aware clustering scheme show that an energy savings of9% and PU detection performance improvement of 11.6% can be achieved. …”
Get full text
Get full text
Thesis -
13
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
14
Adaptive differential evolution algorithm with fitness based selection of parameters and mutation strategies / Rawaa Dawoud Hassan Al-Dabbagh
Published 2015“…ARDE algorithm makes use of JADE strategy and the MDE_pBX parameters adaptive schemes as frameworks. …”
Get full text
Get full text
Thesis -
15
Secure and Efficient Distributed Relay-Based Rekeying Algorithm for Group Communication in Mobile Multihop Relay Network
Published 2014“…The forward and backward secrecy of the proposed scheme has been extensively validated by formal method using rank theorem. …”
Get full text
Get full text
Get full text
Article -
16
Post quantum signature schemes for the block chain technology
Published 2019“…First we study the different properties and uses of signature schemes, and how Elliptic Curve Digital Signature Algorithm is used in the blockchain technology. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
17
Mobility management schemes based on multiple criteria for optimization of seamless handover in long term evolution networks
Published 2014“…The second scheme is cell selection based on multiple criteria decision making (MCDM) approach. …”
Get full text
Get full text
Thesis -
18
Differential evolution based special protection and control scheme for contingency monitoring of transmission line overloading
Published 2017“…In this paper, a Special Protection and Control Scheme (SPCS) based on Differential Evolution (DE) algorithm for optimal generation rescheduling to mitigate line overloads in contingency conditions has been presented. …”
Get full text
Get full text
Conference or Workshop Item -
19
Active force control with iterative learning control algorithm for a vehicle suspension
Published 2013“…ILC algorithm is implemented into AFC-based control scheme to reduce its complexity and hence faster response, by replacing the use of artificial intelligence (Al) method as proposed by previous researcher. …”
Get full text
Get full text
Thesis -
20
An enhanced color image encryption algorithm using LT-PRNG
Published 2018“…Only the authorized receiver can decrypt the ciphertext with the secret key(s) to obtain the plaintext. Several chaos-based image encryption algorithms use low-dimension chaos as the encryption tools. …”
Get full text
Get full text
Thesis
