Search Results - (( java location based algorithm ) OR ( learner detection using algorithm ))
Search alternatives:
-
1
A conceptual multi-agent framework using ant colony optimization and fuzzy algorithms for learning style detection
Published 2023“…We discuss both agent and multi-agent systems and focus on the implications of the theory of detecting learning styles that constitutes behaviors of learners when using online learning systems, learner's profile, and the structure of multi-agent learning systems. …”
Conference Paper -
2
-
3
-
4
Group formation using genetic algorithm
Published 2009“…However, due to lack of programming skills especially in Java programming language and the inability to have meetings frequently among the group members,most of the students’ software project cannot be delivered successfully.To solve this problem, systematic group formation is one of the initial factors that should be considered to ensure that every group consists of quality individuals who are good in Java programming and also to ensure that every group member in a group are staying closer to each other.In this research, we propose a method for group formation using Genetic Algorithms, where the members for each group will be generated based on the students’ programming skill and location of residential colleges.…”
Get full text
Get full text
Get full text
Get full text
Monograph -
5
Multi-floor indoor location estimation system based on wireless local area network
Published 2007“…The most probable match is selected and returned as estimated location based on Bayesian filtering algorithm. Estimated location is reported as physical location and symbolic location. …”
Get full text
Get full text
Thesis -
6
An ensemble deep learning classifier stacked with fuzzy ARTMAP for malware detection
Published 2023“…In this paper, we propose an ensemble DL classifier stacked with the Fuzzy ARTMAP (FAM) model for malware detection. The stacked ensemble method uses several heterogeneous deep neural networks as the base learners. …”
Get full text
Get full text
Get full text
Article -
7
-
8
Android Malware classification using static code analysis and Apriori algorithm improved with particle swarm optimization
Published 2014“…The results of the experiments show that the proposed combined technique has remarkable benefits over the detection using only supervised or unsupervised learners.…”
Get full text
Get full text
Get full text
Proceeding Paper -
9
Development of an automated tool for detecting errors in tenses
Published 2012“…This proves that ATDEiT™ has the potential to be used as an automated tool for detecting errors in tenses for ESL learners.…”
Get full text
Get full text
Get full text
Article -
10
Static code analysis of permission-based features for android malware classification using apriori algorithm with particle swarm optimization
Published 2015“…In this method, permission-based features were extracted from Android applications byte-code through static code analysis, selected and were used to train supervised classifiers. Using a number of candidate detectors from an improved Apriori Algorithm with Particle Swarm Optimization, the true positive rate of detecting malicious code is maximized, while the false positive rate of wrongful detection is minimized. …”
Get full text
Get full text
Get full text
Article -
11
Learner’s emotion prediction using production rules classification algorithm through brain computer interface tool
Published 2018“…From the data analysis using WEKA software, the production rules classifier (PART) is found to be the most accurate classification algorithm in classifying the emotion which yields the highest precision percentage of 99.6% compared to J48 (99.5%) and Naïve Bayes (96.2%). …”
Get full text
Get full text
Thesis -
12
A parallel ensemble learning model for fault detection and diagnosis of industrial machinery
Published 2023“…The base learners adopt a hybrid Back-Propagation (BP) and Particle Swarm Optimization (PSO) algorithms to exploit the corresponding local and global optimization capabilities for identifying optimal features and improving FDD performance. …”
Get full text
Get full text
Get full text
Article -
13
Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform
Published 2009“…The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
A multi-nets ANN model for real-time performance-based automatic fault diagnosis of industrial gas turbine engines
Published 2017“…Two back-propagation training algorithms, namely the Levenberg–Marquardt and Bayesian regularization algorithms, and the k-fold cross-validation technique, were employed to train the optimal networks using a training data set. …”
Get full text
Get full text
Article -
15
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…Subsequently, this project embedded with a lightweight Geo-Encryption algorithm to preserve the privacy of real-time GPS location. …”
Get full text
Get full text
Get full text
Academic Exercise -
16
Friendship Degree and Tenth Man Strategy: A new method for differentiating between erroneous readings and true events in wireless sensor networks
Published 2023“…The second stage will validate the voting process through a novel perspective based on the TMS. TMS will check the voters’ replies based on the event’s location. …”
Get full text
Get full text
Article -
17
EMOTION RECOGNITION USING GALVANIC SKIN RESPONSE (GSR) SIGNAL
Published 2022“…The classified affective GSR signals with labels were obtained from the arousal seven-point emotional scale approach using machine learning algorithms. Features and class labels can import into the Classification Learner application in MATLAB software to train and test various classifiers. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
18
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
19
Fuzzy-based multi-agent approach for reliability assessment and improvement of power system protection
Published 2015“…The second agent is a reliability evaluation agent that uses a recursive algorithm to predict the suitability generator based on the frequency and duration reliability indices in each state while the third agent is the storage and transfer of data between the other two agents. …”
Get full text
Get full text
Thesis -
20
Identification Of Flow Blockage Levels In Centrifugal Pump By Machine Learning
Published 2021“…Machine learning can be used as a preventive measure to detect the blockage in the pump inlet at inception level. …”
Get full text
Get full text
Monograph
