Search Results - (( java implementation learning algorithm ) OR ( using second window algorithm ))
Search alternatives:
- implementation learning »
- java implementation »
- learning algorithm »
- window algorithm »
-
1
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
2
An Educational Tool Aimed at Learning Metaheuristics
Published 2020“…Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
Get full text
Get full text
Get full text
Thesis -
4
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
Get full text
Get full text
Get full text
Thesis -
5
Epileptic Seizure Detection Using Singular Values And Classical Features Of EEG Signals
Published 2014“…In this algorithm a sliding window of one second is utilized to check for epileptic seizure at each second and the classification method used is support vector machine (SVM). …”
Get full text
Get full text
Final Year Project -
6
Flexible window-based scheduling with critical worst case latency evaluations for real time traffic in time sensitive networks
Published 2022“…The first part introduces a flexible window-overlapping scheduling (FWOS) algorithm that allows the TT windows to overlap in GCL implementations. …”
Get full text
Get full text
Thesis -
7
Fair bandwidth distribution marking and scheduling algorithm in network traffic classification
Published 2019“…Second, an Optimized time sliding window packet marker (OTSWTCM) algorithm. …”
Get full text
Get full text
Thesis -
8
-
9
Predictive dynamic CFD approach to reducing airborne transmission in naturally ventilated hospital rooms: Impact of window opening angles during transitional cold seasons in China...
Published 2025“…Stepwise polynomial regression has been validated as a novel algorithm that can effectively predict window opening angles. …”
Get full text
Get full text
Get full text
Thesis -
10
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
11
Development Of Stereo-Matching Algorithm Based On Adaptive Weighted Prediction
Published 2019“…This thesis proposes an algorithm to handle the limitations. Firstly, pre-processing used Sobel Filter was added at initial step to compensate photometric distortion of input images. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
Efficient hardware design for palm-dorsa vein image enhancement
Published 2018“…The aim of this thesis is to develop hardware design for palm-dorsa vein image enhancement algorithm. The algorithm is designed in hardware using hardware description language for hardware realization. …”
Get full text
Get full text
Get full text
Thesis -
13
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
14
Resource Minimization in a Real-time Depth-map Processing System on FPGA
Published 2011“…The system achieves performance of 295 mega pixel disparity per second(MPDS) for the architecture with 640x480 pixels image, 3x3 pixels window size, 32 pixels disparity range and 30 frames per second. …”
Get full text
Get full text
Conference or Workshop Item -
15
MINIMIZATION OF RESOURCE UTILIZATION FOR A REAL-TIME DEPTH-MAP COMPUTATIONAL MODULE ON FPGA
Published 2011“…The system achieves SAD performance of 295 mega pixel disparity per second (MPDS) for the architecture with 640x480 pixel image, 3x3 pixel window size, 32 pixel disparity range and 30 frames per second. …”
Get full text
Get full text
Thesis -
16
Enhanced TCPW's Fast Retransmission and Fast Recovery Mechanism over High Bit Errors Networks
Published 2024“…The two modifications are implemented and evaluated using ns-3 simulator. We compared the throughput and congestion window size of the new proposed modifications to TCPW and NewReno. …”
Proceedings Paper -
17
Epileptic seizure detection using singular values and classical features of EEG signals
Published 2015“…Using CHB-MIT Scalp EEG Database, the calculations of the features are performed over a sliding window of one second. …”
Get full text
Get full text
Conference or Workshop Item -
18
Fuzzy time series sliding window model for rainfall forecasting / Siti Nor Fathihah Azahari
Published 2017“…At the same time, FTS is combined with Sliding Window Algorithm (SWA) to enhance the model. Several enhancements made to SWA is the second objective in this study. …”
Get full text
Get full text
Thesis -
19
QTCP: an optimized and improved congestion control algorithm of high-speed TCP networks
Published 2011Get full text
Get full text
Conference or Workshop Item -
20
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise
