Search Results - (( solution construction sensor algorithm ) OR ( java implementation learning algorithm ))
Search alternatives:
- implementation learning »
- solution construction »
- construction sensor »
- java implementation »
- learning algorithm »
- sensor algorithm »
-
1
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
2
Clustering Approach In Wireless Sensor Networks Based On K-Means: Limitations And Recommendations
Published 2019“…One of most popular cluster algorithms that utilizing into organize sensor nodes is K-means algorithm. …”
Get full text
Get full text
Get full text
Article -
3
An Educational Tool Aimed at Learning Metaheuristics
Published 2020“…Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
Get full text
Get full text
Get full text
Thesis -
5
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
Get full text
Get full text
Get full text
Thesis -
6
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
7
-
8
Development of drift conversion algorithm for ISFET based pH sensor for continuous measurement system
Published 2018Get full text
Get full text
Research Report -
9
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
10
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
11
A Robust Graph Theoretic Solution of Routing in Intelligent Networks
Published 2022“…That is why a simple and efficient algorithm is the need of the time. A robust routing solution SPT with OV+E time complexity is proposed to supersede the existing landmark. …”
Get full text
Get full text
Article -
12
Design and development of single-axis solar tracking system and water level control for application of line focus concentrator for solar desalination process
Published 2017“…Besides that, to make the system more flexible, we add the sensor which is ultrasonic sensor for measure water level. …”
Get full text
Get full text
Undergraduates Project Papers -
13
Fault Detection and Identification in Quadrotor System (Quadrotor Robot)
Published 2016“…The aim of the research is to construct and design a Fault Detection and Isolation algorithm. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Friendship Degree and Tenth Man Strategy: A new method for differentiating between erroneous readings and true events in wireless sensor networks
Published 2023“…FD-TMS was comprehensively assessed in a simulation environment utilizing a performance analysis tool constructed on Java. The results were compared to the baseline algorithm, highlighting key parameters like false alarms and event detection accuracy. …”
Get full text
Get full text
Article -
15
Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform
Published 2009Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Fault Tolerance for Complex System
Published 2016“…The aim of this research is to construct and design a new Fault Tolerance algorithm. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Energy-efficient communications in wireless powered cognitive radio networks based on game theory / Fadhil Mukhlif Aswad Al-Obaidy
Published 2020“…In order to prove the effectiveness of such algorithms, numerical solutions are used in comparison with current power control algorithms. …”
Get full text
Get full text
Get full text
Thesis -
18
Review of data fusion methods for real-time and multi-sensor traffic flow analysis
Published 2023Review -
19
Earthquake alarm detector / Nik Aqil Farihin Nik Mohd Azizee
Published 2024“…The proposed Earthquake Alarm Detector would utilize advanced seismic sensors, real-time data processing algorithms, and communication technologies to deliver prompt and accurate warnings, therefore mitigating the impact of earthquakes. …”
Get full text
Get full text
Student Project -
20
Fault Tolerance For Two Wheel Mobile Robot Using FSM (Finite State Machine)
Published 2017“…The aim of this research is to construct and design a Fault Tolerance algorithm considered to speed up the fault isolation procedure and it might identify multiple fault with the same static fault signature. …”
Get full text
Get full text
Get full text
Article
