Search Results - (( java implementation some algorithm ) OR ( using modulated learning algorithm ))
Search alternatives:
- java implementation »
- implementation some »
- modulated learning »
- learning algorithm »
- using modulated »
- some algorithm »
-
1
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
2
-
3
Study of machine learning in computer vision using Raspberry Pi
Published 2024text::Final Year Project -
4
Route Optimization System
Published 2005“…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
Get full text
Get full text
Final Year Project -
5
Hybrid bat algorithm-artificial neural network for modeling operating photovoltaic module temperature: article / Noor Rasyidah Hussin
Published 2014“…Bat algorithm is an optimizer tool and developed using of echolocation characteristics of bats, while the neural network is learning methods that approach the human brain using artificial neurons. …”
Get full text
Get full text
Article -
6
Hybrid bat algorithm hybrid-artificial neural network for modeling operating photovoltaic module temperature / Noor Rasyidah Hussin
Published 2014“…Bat algorithm is an optimizer tool and developed using of echolocation characteristics of bats, while the neural network is learning methods that approach the human brain using artificial neurons. …”
Get full text
Get full text
Thesis -
7
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…It is shown that the implementation of AES encryption algorithm is capable to secure data stored in HDFS to some extent.…”
Get full text
Get full text
Conference or Workshop Item -
8
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…It is shown that the implementation of AES encryption algorithm is capable to secure data stored in HDFS to some extent.…”
Get full text
Get full text
Conference or Workshop Item -
9
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
10
Fuzzy modeling using Bat Algorithm optimization for classification
Published 2018“…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
11
Implementation of RIO in UMJaNetSim / Chan Chin We
Published 2004“…In this project, I will do some research on the recent TCP congestion control and avoidance mechanisms and implement one of the mechanisms into the Java Network Simulator (JaNetSim). …”
Get full text
Get full text
Thesis -
12
Combination of perturb and observe with online sequential extreme learning machine for photovoltaic system maximum power point tracking
Published 2018“…From different MPPT techniques previously proposed, the online sequential extreme learning machine algorithm and conventional perturb and observe are combined together as a proposed MPPT algorithm. …”
Get full text
Get full text
Get full text
Thesis -
13
Experimental implementation controlled SPWM inverter based harmony search algorithm
Published 2023Article -
14
-
15
Comparison of performances of Jaya Algorithm and Cuckoo Search algorithm using benchmark functions
Published 2022“…This paper aims to compare the performance of two metaheuristic algorithms which are Jaya Algorithm (JA) and Cuckoo Search (CS) using some common benchmark functions. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
New Learning Models for Generating Classification Rules Based on Rough Set Approach
Published 2000“…So, the application of the theory as part of the learning models was proposed in this thesis. Two different models for learning in data sets were proposed based on two different reduction algorithms. …”
Get full text
Get full text
Thesis -
17
A framework for Malaysian Sign Language Recognition using deep learning initiatives / Imran Md Jelas
Published 2022“…Hence, the main objective of this paper is to develop a Framework for Malaysian Sign Language Recognition using Deep Learning. To achieve this objective, we propose a framework consisting of three main modules namely learning module, training module and detection module. …”
Get full text
Get full text
Get full text
Article -
18
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
Get full text
Get full text
Thesis -
19
Building extraction of worldview3 imagery via support vector machine using scikit-learn module / Najihah Ismail
Published 2021“…However, there is need to monitor the effectiveness of the method used effectively. Consequently, this study is intending to apply Support Vector Machine (SVM) classification which using Scikit-learn module for building classification. …”
Get full text
Get full text
Thesis -
20
Detection of surface defects of aluminium extrudants using artificial intelligence
Published 2024“…This study aims to replace manual and inefficient automated defect detection with an approach that uses object detection. The objectives of this study include implement YOLOv8 model to identify and categorise the aluminium surface defect with the aid of data augmentation, transfer learning and addition of attention modules. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis
