Search Results - (( basic generation matching algorithm ) OR ( java implementation learning algorithm ))

Refine Results
  1. 1

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Instance matching framework for heterogeneous semantic web content over linked data environment by Mansir, Abubakar

    Published 2021
    “…These frameworks suffer a high amount of comparisons in discovering matching attributes at initial stage which leads to missing attributes in generating training samples, thus results to incomplete alignment generation as matching output. …”
    Get full text
    Get full text
    Thesis
  3. 3

    A fuzzy case-based reasoning model for software requirements specifications quality assessment by Mostafa S.A., Gunasekaran S.S., Khaleefah S.H., Mustapha A., Jubair M.A., Hassan M.H.

    Published 2023
    “…The fuzzy Logic technique works on the selected nearest cases and it utilizes similarity measurement methods to classify the cases into no-match, partial-match and complete-match cases. The features matching results assist the revised step of the CBR to generate a new solution. …”
    Article
  4. 4

    An Educational Tool Aimed at Learning Metaheuristics by Kader, Md. Abdul, Jamaluddin, Jamal A., Kamal Z., Zamli

    Published 2020
    “…Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment by Ruzita, Ahmad

    Published 2013
    “…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Face Detection System / Chan Beh Teng by Chan, Beh Teng

    Published 2004
    “…The method used for detecting face is a combination of color based technique and template matching. A gray-scale image is generated from the original input image. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Bottleneck adjacent matching heuristics for scheduling a re-entrant flow shop with dominant machine problem by Sh Ahmad, Sh Salleh

    Published 2009
    “…Third, bottleneck approach was utilised in the study and the analysis using Visual Basic macro programming indicated that this method produced good results. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Design And Evaluation Of A Modified Csma/Cd Mac Protocol On Single-Channel Optical Local Area Network by Khairi, Kharina

    Published 2003
    “…The algorithm was developed in Visual Basic 6.0v programming language. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Transcriptomic Study of Gracilaria Changii (Gracilariales, Rhodophyta) By Expressed Sequence Tags and Cdna Microarray Approach by Seddon, Teoh

    Published 2009
    “…The putative identity of TUGs was identified by using Basic Local Alignment Search Tool X (BLASTX) algorithm and classified according to the functional groups in Kyoto Encyclopedia of Genes and Genomes (KEGG). …”
    Get full text
    Get full text
    Thesis
  13. 13

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  14. 14

    Fingerprint reconstruction based on improved directional image by Othman, Mohamad Kharulli

    Published 2005
    “…In the conventional approach, for instance, a low quality image will generate many artificial minutiaes which lead to errors in fingerprint matching. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    Gravitational energy harvesting system based on multistage braking technique for multilevel elevated car parking building by Al Kubaisi, Yasir Mahmood

    Published 2020
    “…Thirdly, modeling of electrical and mechanical parameters for the presented system such that the system performance matching the model, this process is performed by using a parameter optimization algorithm. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Fractal coding of bio-metric image for face authentication by Ahadullah, Md

    Published 2021
    “…The thesis also compares the results of enough images of various sizes generated by the proposed algorithms with the results of other fractal coding methods to confirm the algorithms’ clarity, reliability and validity. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Query proof structure caching for incremental evaluation of tabled prolog programs / Taher Muhammad Ali by Taher Muhammad, Ali

    Published 2013
    “…These mechanisms are pattern-matching, treebased data structuring and backtracking. …”
    Get full text
    Get full text
    Get full text
    Thesis