Search Results - (( java implementation some algorithm ) OR ( parameter interactive learning algorithm ))
Search alternatives:
- interactive learning »
- java implementation »
- implementation some »
- learning algorithm »
- some algorithm »
- parameter »
-
1
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
2
-
3
On Adopting Parameter Free Optimization Algorithms for Combinatorial Interaction Testing
Published 2015“…In doing so, this paper reviews two existing parameter free optimization algorithms involving Teaching Learning Based Optimization (TLBO) and Fruitfly Optimization Algorithm (FOA) in an effort to promote their adoption for CIT.…”
Get full text
Get full text
Get full text
Article -
4
Route Optimization System
Published 2005“…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
Get full text
Get full text
Final Year Project -
5
Interaction effect of process parameters and Pd-electrocatalyst in formic acid electro-oxidation for fuel cell applications: Implementing supervised machine learning algorithms
Published 2023“…Carbon nanotubes; Electrocatalysts; Electrooxidation; Forestry; Formic acid; Gaussian distribution; Learning algorithms; Palladium; Parameter estimation; Regression analysis; Support vector machines; Formic acid electrooxidation; Fuel cell application; Gaussian kernel functions; Gaussian process regression; Interaction effect; Machine learning algorithms; Performance; Process parameters; Regression trees; Support vector machine regressions; Sensitivity analysis…”
Article -
6
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…It is shown that the implementation of AES encryption algorithm is capable to secure data stored in HDFS to some extent.…”
Get full text
Get full text
Conference or Workshop Item -
7
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…It is shown that the implementation of AES encryption algorithm is capable to secure data stored in HDFS to some extent.…”
Get full text
Get full text
Conference or Workshop Item -
8
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
9
Development of an interactive learning tool for analysis of fast fourier transform from butterfly diagram
Published 2023“…This project is to develop an interactive learning tool for the analysis of Fast Fourier Transform from the butterfly diagram. …”
text::Thesis -
10
Modeling the properties of terminal blend crumb rubber modified bitumen with crosslinking additives
Published 2025Subjects:Article -
11
Neural Network Multi Layer Perceptron Modeling For Surface Quality Prediction in Laser Machining
Published 2009“…The researchers conducted the prediction of laser machining quality, namely surface roughness with seven significant parameters to obtain singleton output using machine learning techniques based on Quick Back Propagation Algorithm. …”
Get full text
Get full text
Book Chapter -
12
Autism Spectrum Disorder Classification Using Deep Learning
Published 2021“…In the future, different types of deep learning algorithms need to be applied, and different datasets can be tested with different hyper-parameters to produce more accurate ASD classifications.…”
Get full text
Get full text
Get full text
Get full text
Article -
13
Machine learning model for performance prediction in mobile network management / Muhammad Hazim Wahid
Published 2022“…One of the major challenges when applying machine learning is to identify the best algorithm from a variety of algorithms to solve a problem. …”
Get full text
Get full text
Thesis -
14
Fuzzy modeling using Bat Algorithm optimization for classification
Published 2018“…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
15
Implementation of RIO in UMJaNetSim / Chan Chin We
Published 2004“…In this project, I will do some research on the recent TCP congestion control and avoidance mechanisms and implement one of the mechanisms into the Java Network Simulator (JaNetSim). …”
Get full text
Get full text
Thesis -
16
Comparison of performances of Jaya Algorithm and Cuckoo Search algorithm using benchmark functions
Published 2022“…This paper aims to compare the performance of two metaheuristic algorithms which are Jaya Algorithm (JA) and Cuckoo Search (CS) using some common benchmark functions. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
A fast learning network with improved particle swarm optimization for intrusion detection system
Published 2019“…However, the internal power parameters (weight and basis) of FLN are initialized at random, causing the algorithm to be unstable. …”
Get full text
Get full text
Thesis -
18
A fuzzy adaptive teaching learning-based optimization strategy for generating mixed strength t-way test suites
Published 2019“…Unlike most existing meta-heuristic algorithms, and by virtue of being parameter-free, TLBO does not have any specific parameter controls. …”
Get full text
Get full text
Thesis -
19
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
Get full text
Get full text
Thesis -
20
Hyper-heuristic strategy for input-output-based interaction testing
Published 2022“…Classical test case design strategies, however, do not sufficiently include support for exploration of faults due to interaction between parameter values. New strategies known as t-way strategies (where t expresses interaction strength) have been developed for finding interaction faults. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item
