Search Results - (( solution communicative ability algorithm ) OR ( java implementation learning algorithm ))
Search alternatives:
- implementation learning »
- solution communicative »
- java implementation »
- learning algorithm »
-
1
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
2
An Educational Tool Aimed at Learning Metaheuristics
Published 2020“…Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
Get full text
Get full text
Get full text
Thesis -
4
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
Get full text
Get full text
Get full text
Thesis -
5
DACS3:Embedding Individual Ant Behavior in Ant Colony System
Published 2008“…Modeling individual ants’ ability to manipulate this substance can help an ACS find the best solution. …”
Get full text
Get full text
Conference or Workshop Item -
6
DACS3: Embedding Malaysian Individual Ant Behavior in Ant Colony System
Published 2009“…Modeling individual ants’ ability to manipulate this substance can help an ACS find the best solution. …”
Get full text
Get full text
Citation Index Journal -
7
Efficient and secured compression and steganography technique in wireless sensor network
Published 2016“…The proposed solution is designed to be less complicated, low energy consumption and resource efficient with the ability to provide a lossless compression for a variety of data size. …”
Get full text
Get full text
Get full text
Thesis -
8
-
9
The design and applications of the african buffalo algorithm for general optimization problems
Published 2017“…There have been several scientific investigations in the past several decades on discovering effective and efficient algorithms to providing solutions to the optimization needs of mankind leading to the development of deterministic algorithms that provide exact solutions to optimization problems. …”
Get full text
Get full text
Thesis -
10
Reducing Iteration Using Candidate List
Published 2008“…Traveling Salesman Problem (TSP) was used as a case study to show the capability of the algorithm in order to find the best solution in terms of the shortest distance. …”
Get full text
Get full text
Conference or Workshop Item -
11
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
12
-
13
-
14
A study of mobile IP and its security aspects in a LAN environment / Suhaila Che Ismail
Published 1998“…Mobility, is the ability of a node to change its poinf-of-attachment from one link to another, maintaining all existing communications and using the same IP address at its new link. …”
Get full text
Get full text
Thesis -
15
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
16
Ascertaining trust of information transmitted during a disaster
Published 2023“…One of the potential solutions is to use trust algorithm to identify the trusted information. …”
Article -
17
Ascertaining trust of information transmitted during a disaster
Published 2016“…One of the potential solutions is to use trust algorithm to identify the trusted information. …”
Get full text
Get full text
Article -
18
Ascertaining trust of information transmitted during a disaster
Published 2016“…One of the potential solutions is to use trust algorithm to identify the trusted information. …”
Get full text
Get full text
Article -
19
An adaptive relay selection scheme for enhancing network stability in VANETs
Published 2020“…The CACA algorithm is introduced to improve the ability of the MPR scheme for maintaining long-lived routes. …”
Get full text
Get full text
Get full text
Article -
20
Improved Dynamic Ant Colony System (DACS) on Symmetric Traveling Salesman Problem (TSP).
Published 2007“…Thus, this new level of pheromone updates which manipulating and empowering the searching experiences of individual ants can improve the current ACS algorithm. Traveling Salesman Problem (TSP) was used as a case study to show the capability of the algorithm in order to find the best solution in terms of the shortest distance. …”
Get full text
Get full text
Conference or Workshop Item
