Search Results - (( solution information system algorithm ) OR ( java implementation learning algorithm ))
Search alternatives:
- implementation learning »
- solution information »
- java implementation »
- information system »
- learning algorithm »
- system algorithm »
-
1
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
2
An Educational Tool Aimed at Learning Metaheuristics
Published 2020“…Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
Get full text
Get full text
Get full text
Thesis -
4
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
Get full text
Get full text
Get full text
Thesis -
5
Adaptive intelligence job online scheduling within dynamic grid environment based on gridsim
Published 2008“…Moreover, both dynamic and static information are handled by the solution. In static case, the resource information such as a number of CPUs of a machine, CPU speed, a number machine in the grid system is significantly known in advance while dynamic information like the arrival jobs that are submitted to the system any time during simulation. …”
Get full text
Get full text
Article -
6
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
7
Information Security Analysis and Solution using LSB Steganography and AES Cryptographic Algorithm
Published 2023“…The significance of information security analysis and solutions has been emphasized by earlier research in several application areas. …”
Get full text
Get full text
Get full text
Article -
8
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
9
-
10
Privacy optimization and intrusion detection in modbus/tcp network-based scada in water distribution systems
Published 2021“…In relation to information loss, the proposed solution was able to achieve an average of 12.2% against 18.6% of the benchmark solution. …”
Get full text
Get full text
Thesis -
11
-
12
Analysis of confidentiality algorithms in different mobile generations
Published 2017“…emails, bank transactions, voice calls, ... ) was exchanged via the mobile systems. The protection of information confidentiality became a serious problem for the customers of these systems. …”
Get full text
Get full text
Get full text
Proceeding Paper -
13
Economic dispatch solution using moth-flame optimization algorithm
Published 2018Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Enhanced algorithms for three-dimensional object interpreter
Published 2004Get full text
Get full text
Get full text
Thesis -
15
Vehicle detection for vision-based intelligent transportation systems using convolutional neural network algorithm
Published 2022“…Despite the growing popularity in research, it remains a challenging problem that must be solved. Hardware-based solutions such as radars and LIDAR are been proposed but are too expensive to be maintained and produce little valuable information to human operators at traffic monitoring systems. …”
Get full text
Get full text
Get full text
Get full text
Article -
16
New heuristic function in ant colony system algorithm
Published 2012“…NP-hard problem can be solved by Ant Colony System (ACS) algorithm.However, ACS suffers from pheromone stagnation problem, a situation when all ants converge quickly to one sub-optimal solution.ACS algorithm utilizes the value between nodes as heuristic value to calculate the probability of choosing the next node.However, the heuristic value is not updated throughout the process to reflect new information discovered by the ants.This paper proposes a new heuristic function for the Ant Colony System algorithm that can reflect new information discovered by ants.The credibility of the new function was tested on travelling salesman and grid computing problems.Promising results were obtained when compared to classical ACS algorithm in terms of best tour length for the travelling sales-man problem. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
-
18
Festive season balancing groceries optimization / Fairuz Mohamed Razi
Published 2012“…The methodology of this project is divided into several phases. The phases are information gathering, system requirement, data collection, system design and implementation, result analysis. …”
Get full text
Get full text
Thesis -
19
Opportunistic and playback-sensitive scheduling for video streaming
Published 2014“…The proposed solution combines a buffer management strategy with a packet scheduling algorithm. …”
Get full text
Get full text
Get full text
Article -
20
Implementation and Evaluation of Large Rsa Encryption and Decryption Keys For Internet Security
Published 2004“…The problem is computer crime via hackers,crackers, and thieves. The solution is to apply a security system upon the online system. …”
Get full text
Get full text
Thesis
