Search Results - (( java implementation using algorithm ) OR ( learning content learning algorithm ))
Search alternatives:
- implementation using »
- java implementation »
- learning algorithm »
- learning content »
- content learning »
- using algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
-
3
Provider independent cryptographic tools
Published 2003“…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
Get full text
Get full text
Get full text
Monograph -
4
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
5
An adaptive HMM based approach for improving e-Learning methods
Published 2023“…This adaptive algorithm can thus be applied to any e-learning platform for optimal content delivery to its users in real-time. © 2014 IEEE.…”
Conference Paper -
6
Meta-Heuristic Algorithms for Learning Path Recommender at MOOC
Published 2021“…Online learning platforms, such as Coursera, Edx, Udemy, etc., offer thousands of courses with different content. …”
Get full text
Get full text
Article -
7
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
8
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
Get full text
Get full text
Conference or Workshop Item -
9
A new SMS spam detection method using both Content-Based and non Content-Based features
Published 2024Subjects:Conference Paper -
10
Automatic Number Plate Recognition on android platform: With some Java code excerpts
Published 2016“…On the other hand, the traditional algorithm using template matching only obtained 83.65% recognition rate with 0.97 second processing time. …”
Get full text
Get full text
Get full text
Book -
11
Evaluation of rehearsal effects of multimedia content based on EEG using machine learning algorithms
Published 2017“…This paper will present the rehearsal effects based on electroencephalography (EEG) recorded data for multimedia contents. Three frequency based features are used to discriminate the three learning states mentioned as L1, L2 and L3 using machine learning algorithms. …”
Get full text
Get full text
Article -
12
Review on ubiquitous education system with multi-agent synchronization on mobile learning application environment
Published 2012“…The sync agent (Multi-agent system) proposed algorithm is based on the use of mobile agents which runs from the host (sender) computer and then migrates to the receiving (receiver) mobile computer to continue the process of updating learning contents before coming back to the sender for completing the process. …”
Get full text
Get full text
Conference or Workshop Item -
13
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…Java Media Framework library and the RTP protocol for audio transmission were used as development tools.The developed system designed in this thesis together with experimental results proved that the system could be implemented successfully. …”
Get full text
Get full text
Thesis -
14
Music Recommender System Using Machine Learning Content-Based Filtering Technique
Published 2022“…These are the popular algorithm for unsupervised learning, a machine learning method to analyse and cluster datasets. …”
Get full text
Get full text
Undergraduates Project Papers -
15
The development and implementation of web content adaptation and negotiation based on user, device and network profiles / Harizah Sazali
Published 2006“…Based on the experiment results, it is proved that content adaptation under e-learning environment can be achieved by the algorithms effectively.…”
Get full text
Get full text
Student Project -
16
Application of deep learning algorithms in lung sound classification: A systematic review since 2015
Published 2025“…The article’s thorough analysis revealed that deep learning algorithms have outperformed traditional machine learning techniques in lung sound classification.…”
Get full text
Get full text
Get full text
Get full text
Article -
17
Web usage mining for UUM learning care using association rules
Published 2004“…With the powerful of data mining technique, Web usage mining approach has been combined with the basic Association Rules, Apriori Algorithm to optimize the content of the university E�Learning portal. …”
Get full text
Get full text
Thesis -
18
Web Usage Mining for UUM Learning Care Using Association Rules
Published 2004“…In order to produce the university E-Learning (UUM Educare) portal usage patterns and user behaviors, this paper implements the high level process of Web usage mining using basic Association Rules algorithm - Apriori Algorithm. …”
Get full text
Get full text
Get full text
Thesis -
19
Improved rsync algorithm to minimize communication cost using multi-agent systems for synchronization in multi-learning management systems
Published 2017“…To meet this requirement, a new Multi LMS (MLMS) model using Sharable Content Object Reference Model (SCORM) specifications to share learning materials among different higher learning institutions (HLIs) has been presented. …”
Get full text
Get full text
Get full text
Thesis -
20
Café Web Based System Using Priority Scheduling Approach
Published 2017“…The system is implemented at UniSZA’s café where two different types of user will use the system. …”
Get full text
Get full text
Conference or Workshop Item
