Tìm kiếm tài liệu miễn phí

Kỹ thuật lập trình (36.349)

Những nội dung ôn tập java core

Tài liệu "Những nội dung ôn tập java core" trình bày các tính Chất Của Java OOPs, các kiểu dữ liệu, các từ khóa (static, final, abstract , Interface , override, overload…) và xử lý ngoại lệ trong java. Mời các bạn tham khảo!


Some new de morgan picture operator triples in picture fuzzy logic

Some basic operators of fuzzy logic as negation, t-norms, t-conorms for picture fuzzy sets firstly are defined and studied in [6, 9]. This paper is devoted to some classes of representable picture fuzzy t-norms and representable picture fuzzy t-conorms on PFS and a basic algebra structure of Picture Fuzzy Logic De Morgan triples of picture operators.


Automatic heart disease prediction using feature selection and data mining technique

This paper presents an automatic Heart Disease (HD) prediction method based on feature selection with data mining techniques using the provided symptoms and clinical information assigned in the patients dataset. Data mining which allows the extraction of hidden knowledges from the data and explores the relationship between attributes, is the promising technique for HD prediction.


Minimizing makespan of personal scheduling problem in available time -windows with split min and setup time constraints

This paper deals with personal scheduling problem in available time-windows with splitmin and setup-time constraints. The jobs are splittable into sub-jobs and a common lower bound on the size of each sub-job is imposed. The objective function aims to find a feasible schedule that minimizes the total completion time of all jobs.


GMM for emotion recognition of Vietnamese

The results showed that the recognition scores are rather high with the case for which there is a full combination of parameters as MFCC and its first and second derivatives, fundamental frequency, energy, formants and its correspondent bandwidths, spectral characteristics and F0 variants.


Congestion control algorithm for message routing in structured peer to peer networks

This paper proposes a congestion control algorithm for message routing in structured P2P networks by changing the routing table of nodes in the network to route the packet to the destination without going through congested nodes. The performance of the proposed the method has been evaluated and compared with the conventional Chord protocol.


Some algorithms related to consistent decision table

In this paper, we propose an algorithm finding object reducts of consistent decsion table. On the other hand, we also show an algorithm to find some attribute reducts and the correctness of our algorithms is proof-theoretical. These algorithms of ours have polynomial time complexity. Our finding object reduct helps other algorithms of finding attribute reducts become more effective, especially as working with huge consistent decision table.


Theoretical analysis of picture fuzzy clustering

Recently, picture fuzzy clustering (FC-PFS) has been introduced as a new computational intelligence tool for various problems in knowledge discovery and pattern recognition. However, an important question that was lacked in the related researches is examination of mathematical properties behind the picture fuzzy clustering algorithm such as the convergence, the boundary or the convergence rate, etc. In this paper, we will prove that FC-PFS converges to at least one local minimum. Analysis on the loss function is also considered.


Pedestrian activity prediction based on semantic segmentation and hybrid of machines

The article presents an advanced driver assistance system (ADAS) based on a situational recognition solution and provides alert levels in the context of actual traffic. The solution is a process in which a single image is segmented to detect pedestrians’ position as well as extract features of pedestrian posture to predict the action.


A novel algorithm based on trust authentication mechanisms to detect and prevent malicious nodes in mobile ad hoc network

The simulation results in NS2 show that TAM can successfully detect and prevent to 100% malicious nodes using fake keys and above 99% (the mistaken rate below 1.0%) wormhole nodes under hide mode for all mobility scenarios where there are nodes move with 30m/s maximum speeds and variable tunnel lengths.


Algorithm to build fuzzy decision tree for data classification problem based on fuzziness intervals matching

The precise data classification cannot solve all the requirements. Thus, the fuzzy decision tree classification problem is important for the fuzzy data mining problem. The fuzzy decision classification based on the fuzzy set theory has some limitations derived from its innerself. The hedge algebra with many advantages has become a really useful tool for solving the fuzzy decision tree classification.


A genetic algorithm based method for university course timetabling problems and application in Hanoi open university

In this paper, we propose a method based on genetic algorithms for university course timetabling problems with some modifications and apply it to real-world datasets in Hanoi Open University.


Using sum match kernel with balanced label tree for large scale image classification

In addition, a feature map is used to reformulate the sum-match kernel function as a dot product of two mean feature vectors in a mapped-feature space. Furthermore, we proposed an algorithm for learning a balanced tree which gains the computational efficiency in classification. We carried out experiments on benchmark datasets including Caltech-256, SUN-397, and ImageNet-1K. The evaluation results indicated that our method achieves a significant improvement in terms of accuracy and efficiency compared to other methods. In particular, our method achieved 14.52% in accuracy on ImageNet-1K, compared to 6.51% of the Bengio et al.’s method.


Password encryption based on dynamic graph labeling priority generation (D.G.L.P.G.) technique

In this paper we propose a password encryption technique based on the “Dynamic Graph Labeling Priority Generation (D.G.L.P.G.) Technique” and “Dynamic False Node Insertion (D.F.N.I) Technique” for dynamic password. The algorithm has achieved very low space complexity and time complexity which is O(log n). The emerged technique fits itself in the boundary of the present requisition and is flexible enough to expand its magnitude with the amplifying needs up to the boundary mark of the presented algorithm.


An evaluation method for unsupervised anomaly detection algorithms

In this paper, the authors introduce a method for evaluating the performance of unsupervised anomaly detection techniques. The method is based on the application of internal validation metrics in clustering algorithms to anomaly detection. The experiments were conducted on a number of benchmarking datasets. The results are compared with the result of a recent proposed approach that shows that some proposed metrics are very consistent when being used to evaluate the performance of unsupervised anomaly detection algorithms.


Real - time table plane detection using accelerometer information and organized point cloud data from kinect sensor

In this paper, the authors propose a table plane detection method using information coming from a Microsoft Kinect sensor. The contribution of the paper is three-fold. First, for plane detection step, the dedicated down-sampling algorithms to original point cloud thereby representing it as the organized point cloud structure in are applied to get real-time computation. Second, the acceleration information provided by the Kinect sensor is employed to detect the table plane among all detected planes. Finally, three different measures for the evaluation of the table plane detector are defined.


Improving bottleneck features for Vietnamese large vocabulary continuous speech recognition system using deep neural networks

In this paper, the pre-training method based on denoising auto-encoder is investigated and proved to be good models for initializing bottleneck networks of Vietnamese speech recognition system that result in better recognition performance compared to base bottleneck features reported previously. The experiments are carried out on the dataset containing speeches on Voice of Vietnam channel (VOV).


Content based image retrieval using multiple features and pareto approach

In this paper, the authors propose to use Pareto approach for candidate selection. The proposed algorithm produces a compact set of candidate images when comparing with the entire dataset and this set also contains results obtained from all aggregation operator [3]. The authors also formalize main properties of Pareto front with respect to CBIR which are mainly used to propose our two algorithms.


A packet classification algorithm on multi way priority trie

The field of packet classification speed enhancement has attracted a significant number of researchers. In this paper, we propose a packet classification algorithm based on the idea of priority trie and multi-way trie. The accuracy and efficiency of the proposed algorithm are both theoretically and experimentally proved.


Learning interaction measure with relevance feedback in image retrieval

In this paper, the authors further improve the use of users feedback with multi-feature query and the Choquet integral. Taking into account the interaction among feature sets, feedback information is used to adjust the feature’s relevance weights that are considered as the fuzzy density values in the Choquet integral to define the overall similarity measure between two images.


Symbolic computational models for intuitionistic linguistic information

In 2014, the notion of intuitionistic linguistic labels was first introduced. In this paper, we develop two symbolic computational models for intuitionistic linguistic labels. Various operators are proposed, and their properties are also examined. Then, an application to group decision making using intuitionistic linguistic preference relations is discussed.


Characterizations for several classes of alternative codes

Alternative codes, an extension of the notion of ordinary codes, have been first introduced and considered by P. T. Huy et al. in 2004. In this paper, we consider some new subclasses of alternative codes. In particular, characteristic properties and a hierarchy of such codes are established. Also, algorithms to test for these classes of codes are proposed.


Hedges algebras and fuzzy partition problem for qualitative attributes

In this paper, the author proposed a new method to construct the membership functions (MFs) based on database. The theory of hedge algrebra was used to build the membership functions and GA is applied to optimize them. The experimental results demonstrate the benefits of this method.


Ngôn ngữ mô hình hóa thống nhất UML và ngôn ngữ đặc tả SDL

Bài viết trình bày về ngôn ngữ mô hình hóa thống nhất UML, một ngôn ngữ mà ngày nay đang được sử dụng rất nhiều trong công nghiệp phần mềm và so sánh nó với một ngôn ngữ đặc tả trước đó là ngôn ngữ SDL; trình bày việc phát triển phần mềm dựa trên UML và SDL. Để tìm hiểu rõ hơn, mời các bạn cùng xem và tham khảo.


Bài giảng Lập trình Java - ThS. Huỳnh Công Pháp

Bài giảng Lập trình Java giới thiệu đến người học lập trình ngôn ngữ Java về sự phát triển của Java, các đặc trưng của Java, các phần tử cơ bản ngôn ngữ Java và thành phần cơ bản của 1 chương trình Java. Đồng thời, bài giảng còn trình bày cấu trúc của một chương trình Java: Applets. Mời các bạn cùng tham khảo.


Bài giảng Lập trình mạng: Hướng dẫn lập trình mạng với Visual Basic

Nội dung bài giảng "Lập trình mạng: Hướng dẫn lập trình mạng với Visual Basic" là hướng dẫn các bạn cách thêm Winsock control vào Project. Mời các bạn tham khảo!


Ebook Violent python - A cookbook for hackers, forensic analysts, penetration testers and security engineers

(BQ) This book include penetration testing with python, pennetration testing with python, forensic investigation with python, network trafic analysis with python.


Ebook Gray hat C#: A hacker's duide to creating and automating security tools

(BQ) Ebook Gray hat C#: A hacker's duide to creating and automating security tools include C# crash course, fuzzing and exploiting xss and sql injection.


Ebook Beginning ethical hacking with Python

(BQ) This book is intended for complete programming beginners or general people who know nothing about any programming language but want to learn ethical hacking. Let us clear it first: Ethical Hacking is not associated with any kind of illegal electronic activities. They always stay within laws.


Lập trình trên môi trường trên Windows: Kỹ thuật lập trình Visual C++ (MFC)

Nội dung "Lập trình trên môi trường trên Windows: Kỹ thuật lập trình Visual C++ (MFC)" trình bày về MFC, chương trình MFC, Xử lý mouse và keyboard, Các control và dialog thường gặp. Mời các bạn tham khảo!


Tài liệu mới download

Từ khóa được quan tâm

Có thể bạn quan tâm

Mac OS X Programming phần 2
  • 23/10/2011
  • 86.662
  • 937
Bài tập làm quen với Java
  • 13/02/2012
  • 45.954
  • 688
Programming HandBook part 35
  • 11/10/2010
  • 21.109
  • 339
PHP Tutorial part6
  • 13/08/2010
  • 38.531
  • 720

Bộ sưu tập

Danh mục tài liệu