Search Results - (( loading identification based algorithm ) OR ( java implementation learning algorithm ))
Search alternatives:
- implementation learning »
- loading identification »
- identification based »
- java implementation »
- learning algorithm »
-
1
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
2
Evolutionary Programming (EP) based technique for secure point identification with load shedding technique in power transmission / Abdul Rahman Minhat
Published 2008“…This thesis presents the Evolutionary Programming (EP) based technique for secure point identification with load shedding technique in power transmission system. …”
Get full text
Get full text
Thesis -
3
-
4
An Educational Tool Aimed at Learning Metaheuristics
Published 2020“…Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
Get full text
Get full text
Get full text
Thesis -
6
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
Get full text
Get full text
Get full text
Thesis -
7
High impedance fault detection and identification based on pattern recognition of phase displacement computation
Published 2018“…Subsequently, an automatic HIF classification algorithm based on predefined indices is proposed to perform event identification and HIF detection. …”
Get full text
Get full text
Article -
8
CAT CHAOTIC GENETIC ALGORITHM BASED TECHNIQUE AND HARDWARE PROTOTYPE FOR SHORT TERM ELECTRICAL LOAD FORECASTING
Published 2017“…The solution set (i.e. optimized weight/bias matrix of ANN) provided by the optimized and improved genetic algorithm and modified BP based model is extracted and used in the design and development of a prototype device of the proposed model. …”
Get full text
Get full text
Thesis -
9
Application of system identification method coupled with evolutionary algorithms for the optimization of power consumption in a pem fuel cell propulsion system / Suhadiyana Hanapi
Published 2018“…This thesis makes a number of key contributions to the advancement of fuel cell vehicle design within two main research areas; powertrain system design based on quality energy, and optimization system based on biology based algorithms. …”
Get full text
Get full text
Book Section -
10
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
11
Inverse parameter identification of elastic and inelastic constitutive material models
Published 2011“…This numerical tool combines an optimization algorithm with a finite element solver giving the material response to arbitrary loading. …”
Get full text
Get full text
Get full text
Book Chapter -
12
Damage visualization based on frequency shift of single-mode ultrasound-guided wavefield
Published 2022“…Then, generation of frequency map based on ultrasound spectral imaging (USI) for damage identification is investigated. …”
Get full text
Get full text
Article -
13
Optimization of supply chain management by simulation based RFID with XBEE Network
Published 2015“…Among the widely used technology in recent years is Radio Frequency Identification (RFID). It is an advanced Auto-ID wireless network based configuration system used for identification and tracking of items movement data. …”
Get full text
Get full text
Get full text
Thesis -
14
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
15
-
16
Optimal parameter estimation of permanent magnet synchronous motor by using Mothflame optimization algorithm / Abdolmajid Dejamkhooy and Sajjad Asefi
Published 2018“…In the next step, the parameter identification as an optimization problem is solved by Moth-flame optimization, which is a novel nature-inspired heuristic algorithm. …”
Get full text
Get full text
Get full text
Article -
17
Bio-signal identification using simple growing RBF-network (OLACA)
Published 2007Get full text
Get full text
Conference or Workshop Item -
18
-
19
Data mining for structural damage identification using hybrid artificial neural network based algorithm for beam and slab girder / Meisam Gordan
Published 2020“…After evaluating the results of these algorithms, a hybrid Artificial Neural Network-based Imperial Competitive Algorithm (ANN-ICA) was presented in the deployment step of the proposed methodology to identify the structural damage of illustrative structures. …”
Get full text
Get full text
Get full text
Thesis -
20
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise
