Search Results - (( java implementation some algorithm ) OR ( using modality learning algorithm ))
Search alternatives:
- java implementation »
- implementation some »
- learning algorithm »
- some algorithm »
- using modality »
-
1
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
2
-
3
Route Optimization System
Published 2005“…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
Get full text
Get full text
Final Year Project -
4
Learning a deeply supervised multi-modal RGB-D embedding for semantic scene and object category recognition
Published 2017“…This technique motivates bilateral transfer learning between the modalities by taking the outer product of each feature extractor output. …”
Get full text
Get full text
Get full text
Get full text
Article -
5
Real time electrocardiogram identification with multi-modal machine learning algorithms
Published 2017Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
6
Adaptive Neuro Fuzzy Inference System (ANFIS) and Artificial Neural Networks (ANNs) for structural damage identification
Published 2013“…However the proposed ANFIS architecture using hybrid learning algorithm was found to perform better than the multilayer feedforward ANN which learns using the backpropagation algorithm. …”
Get full text
Get full text
Article -
7
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…It is shown that the implementation of AES encryption algorithm is capable to secure data stored in HDFS to some extent.…”
Get full text
Get full text
Conference or Workshop Item -
8
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…It is shown that the implementation of AES encryption algorithm is capable to secure data stored in HDFS to some extent.…”
Get full text
Get full text
Conference or Workshop Item -
9
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
10
Operational structural damage identification using de-noised modal feature in machine learning / Chen Shilei
Published 2021“…Meanwhile, the unsupervised learning method using PCA-WCC features is good at detecting unknown damage, and is sensitive to low-severity damage. …”
Get full text
Get full text
Get full text
Thesis -
11
Fuzzy modeling using Bat Algorithm optimization for classification
Published 2018“…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
12
Implementation of RIO in UMJaNetSim / Chan Chin We
Published 2004“…In this project, I will do some research on the recent TCP congestion control and avoidance mechanisms and implement one of the mechanisms into the Java Network Simulator (JaNetSim). …”
Get full text
Get full text
Thesis -
13
Damage identification using experimental modal analysis and adaptive neuro-fuzzy interface system (ANFIS)
Published 2012“…The adaptive neuro-fuzzy inference system (ANFIS) is a process for mapping from a given input to a single output using the fuzzy logic and neuro-adaptive learning algorithms. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Comparison of performances of Jaya Algorithm and Cuckoo Search algorithm using benchmark functions
Published 2022“…This paper aims to compare the performance of two metaheuristic algorithms which are Jaya Algorithm (JA) and Cuckoo Search (CS) using some common benchmark functions. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Development of damage identification scheme using de-noised modal frequency response function data with artificial neural network / Mohamad Izzudin Hussein Shah
Published 2018“…Multilayer Perceptron (MLP) with backpropagation learning algorithm ANN is used in this study. Moreover, this study needs to minimize the number of samples used by reducing number of sensors and frequency range used without affecting the performance accuracy. …”
Get full text
Get full text
Thesis -
16
Data mining for structural damage identification using hybrid artificial neural network based algorithm for beam and slab girder / Meisam Gordan
Published 2020“…In the modeling phase, amongst all DM algorithms, the applicability of machine learning, artificial intelligence and statistical data mining techniques were examined using Support Vector Machine (SVM), Artificial Neural Network (ANN) and Classification and Regression Tree (CART) to detect the hidden patterns in vibration data. …”
Get full text
Get full text
Get full text
Thesis -
17
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
Get full text
Get full text
Thesis -
18
-
19
Partitional clustering algorithms for highly similar and sparseness y-short tandem repeat data / Ali Seman
Published 2013“…The idea was incorporated into a new algorithm called, k-Approximate Modal Haplotypes (&-AMH) algorithm. …”
Get full text
Get full text
Thesis -
20
Data fusion and multiple classifier systems for human activity detection and health monitoring: Review and open research directions
Published 2019“…These sensors are pre-processed and different feature sets such as time domain, frequency domain, wavelet transform are extracted and transform using machine learning algorithm for human activity classification and monitoring. …”
Get full text
Get full text
Article
