Search Results - (( affecting implementation drops algorithm ) OR ( java implementation learning algorithm ))

  • Showing 1 - 20 results of 20
Refine Results
  1. 1

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    An Educational Tool Aimed at Learning Metaheuristics by Kader, Md. Abdul, Jamaluddin, Jamal A., Kamal Z., Zamli

    Published 2020
    “…Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment by Ruzita, Ahmad

    Published 2013
    “…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    DEVELOPMENT OF NODE RELIABILITY DETECTION ALGORITHM FOR WIRELESS SENSOR NETWORKS by AZMAN, MOHAMAD AFIQ

    Published 2014
    “…The proposed algorithm is then implemented on hardware compounding of several IRIS sensor motes. …”
    Get full text
    Get full text
    Final Year Project
  6. 6

    DEVELOPMENT OF NODE RELIABILITY DETECTION ALGORITHM FOR WIRELESS SENSOR NETWORKS by AZMAN, MOHAMAD AFIQ

    Published 2014
    “…The proposed algorithm is then implemented on hardware compounding of several IRIS sensor motes. …”
    Get full text
    Get full text
    Final Year Project
  7. 7

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Automated traffic counting data collection and analysis by Low, Anand Hong Ren

    Published 2021
    “…The factors affecting the performance of the algorithm is discussed. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  10. 10

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  11. 11

    Effects of Authentication of Users in Mobile Internet Protocol Version 6 by Obenofunde, Simon Tabi

    Published 2004
    “…Comparisons are done between systems implementing authentication and those that do not. The results show that the average delay is not much affected by the implementation of the program. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Token based path allocation approach for mobile robots in sorting centre for achieving high throughput by Khoo, Zong Zheng

    Published 2024
    “…This project proposes an improved path-finding algorithm that implements token-based path finding while a robot wants to access a grid cell. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  13. 13
  14. 14

    Investigation of maximum power point tracking (MPPT) for active cooling mono-crystalline photovoltaic panel using fuzzy logic controller by Nurul Afiqah, Zainal

    Published 2017
    “…This clearly shows the Vpv produce depends on the PV temperature. By implementing FL based CV algorithm into this method, it makes the system more robust and reliable in terms of effectiveness and efficiency. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Optimization and prediction of battery electric vehicle driving range using adaptive fuzzy technique by Abulifa, Abdulhadi Abdulsalam

    Published 2022
    “…The study also developed an algorithm for predictive EMS using fuzzy model predictive control technique based on regression algorithm. …”
    Get full text
    Get full text
    Thesis
  16. 16

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Identification and mitigation of non-line-of-sight path effect using repeater for hybrid ultra-wideband positioning and networking system by Chung, Gwo Chin, Mohd. Aqmal Syafiq Kamarudin, Lee, It Ee, Tan, Soo Fun

    Published 2021
    “…Although UWB positioning offers precise locality tracking, the accuracy of the estimation is greatly affected by the non-line-of-sight (NLOS) path effect. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Computer-assisted pterygium screening system: a review by Abdani, Siti Raihanah, Zulkifley, Mohd Asyraf, Shahrimin, Mohamad Ibrani, Zulkifley, Nuraisyah Hani

    Published 2022
    “…However, it will start to affect the eyesight of the patient once the tissues encroach towards the corneal region, with a more serious impact if it has grown into the pupil region. …”
    Get full text
    Get full text
    Article
  19. 19

    Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions by Saraswati, Galuh Wilujeng

    Published 2017
    “…The project has also implemented the optimization process onto the proposed ANFIS model through the hybrid of Genetic Algorithm on the fuzzy membership function of the ANFIS model. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20