Search Results - (( software identification method algorithm ) OR ( java implementation learning algorithm ))
Search alternatives:
- software identification »
- implementation learning »
- identification method »
- java implementation »
- learning algorithm »
- method algorithm »
-
1
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
2
Register Transfer Level Implementation Of Pooling - Based Feature Extraction For Finger Vein Identification
Published 2017“…Many improvements methods were utilized to increase the speed and accuracy of the identification. …”
Get full text
Get full text
Thesis -
3
An Educational Tool Aimed at Learning Metaheuristics
Published 2020“…Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
Get full text
Get full text
Get full text
Thesis -
5
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
Get full text
Get full text
Get full text
Thesis -
6
Feature identification in a real surface metrology analysis by means of Double Iteration Sobel (DIS) / Ainaa Farhanah Mohd Razali
Published 2022“…The system algorithm is verified and validates on two sloped bumps surface topographies that have been simulated using MATLAB software and measured using the Alicona Infinite Focus Measurement (IFM) device, respectively. …”
Get full text
Get full text
Thesis -
7
-
8
Three phase fault algorithm in distribution system by using database approach and impedance based method
Published 2012“…The configuration of 132/11kV from actual distribution system in Malaysia with 38 nodes is modelled using the PSCAD/EMTDC software. This work attempt to combine fault section identification with impedance based method in order to address non-homogeneity of cables in distribution system. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
10
Topic identification method for textual document
Published 2017Get full text
Get full text
Get full text
Article -
11
Discrete-Time System Identification Based On Novel Information Criterion Using Genetic Algorithm
Published 2017“…Parameter magnitude-based information criterion 2 (PMIC2), as a novel information criterion, is used alongside Akaike information criterion (AIC). Genetic algorithm (GA) as a popular search method, is used for selecting a model structure. …”
Get full text
Get full text
Get full text
Get full text
Article -
12
Comparison Of Crossover In Genetic Algorithm For Discrete-Time System Identification
Published 2021“…This paper investigates the effect of different types of crossover, namely, single-point, double-point, multiple-point and uniform crossover, within GA in producing an optimum model structure for system identification. This was carried out using a computational software on a number of simulated data. …”
Get full text
Get full text
Get full text
Article -
13
Edge Detection Algorithm For Image Processing Of Search And Rescue Robot
Published 2016“…This paper highlights the various edge detection algorithms working method and comparison is made based on the advantages and disadvantages of the algorithms for the identification of an optimum edge detection algorithm. …”
Get full text
Get full text
Final Year Project -
14
SYSTEM IDENTIFICATION AND MODEL PREDICTIVE CONTROL FOR INTERACTING SERIES PROCESS WITH NONLINEAR DYNAMICS
Published 2009“…The subspace system identification method is used to estimate the linear model parameters. …”
Get full text
Get full text
Thesis -
15
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
16
An automated multimodal white matter hyperintensities identification in MRI brain images using image processing / Iza Sazanita Isa
Published 2018“…In parallel, the automated performance and manual delineation for WMH identification is validated to determine the degree of similarity between both the methods. …”
Get full text
Get full text
Book Section -
17
An automated multimodal white matter hyperintensities identification in MRI brain images using image processing / Iza Sazanita Isa
Published 2018“…In parallel, the automated performance and manual delineation for WMH identification is validated to determine the degree of similarity between both the methods. …”
Get full text
Get full text
Thesis -
18
-
19
Embedded system for biometric identification based on iris detection
Published 2009Get full text
Article -
20
Autoreclosure in Extra High Voltage Lines using Taguchi’s Method and Optimized Neural Networks
Published 2008“…The fault identification prior to reclosing is based on optimized artificial neural network associated with standard Error Back-Propagation, Levenberg Marquardt Algorithm and Resilient Back-Propagation training algorithms together with Taguchi’s Method. …”
Get full text
Get full text
Conference or Workshop Item
