Search Results - (( being solution mining algorithm ) OR ( java implementation learning algorithm ))

  • Showing 1 - 20 results of 20
Refine Results
  1. 1

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Data Classification and Its Application in Credit Card Approval by Thai , VinhTuan

    Published 2004
    “…Many intensive researches have been conducted to enhance the capability of data mining solution in providing the intelligence so that different types of businesses can make informed decisions. …”
    Get full text
    Get full text
    Final Year Project
  3. 3

    Tree-based contrast subspace mining method by Florence Sia Fui Sze

    Published 2020
    “…However, the probability density estimation of a class requires adjustment to the dimensionality or number of features in subspaces which may affect the performance of mining contrast subspace. Besides, the parameter setting and the subspace search strategy of all existing methods are not being optimized to mine contrast subspace. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    An Educational Tool Aimed at Learning Metaheuristics by Kader, Md. Abdul, Jamaluddin, Jamal A., Kamal Z., Zamli

    Published 2020
    “…Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment by Ruzita, Ahmad

    Published 2013
    “…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Optimizing OLAP heterogeneous computing based on Rabin-Karp algorithm by Alzeini, Haytham I M, Hameed, Shihab A., Habaebi, Mohamed Hadi

    Published 2013
    “…A heterogeneous computing is a relatively recent approach that is being under examination. In this paper, through experimental results and based on Rabin-Karp Algorithm; we propose an optimized heterogeneous solution that takes into account the benefits and the boundaries in order to achieve a better OLAP performance in terms of response time with three times gain. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  8. 8

    Profiling network traffic of Sultan Idris Shah building (BSIS) using data mining technique / Rusmawati Ishak by Ishak, Rusmawati

    Published 2018
    “…Orange is a tool that being used in implementing K-Means Clustering Algorithm that could be seen as the most suitable solution to find a network trend pattern of user accessing the Internet and to produce with profiling network. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
    Get full text
    Get full text
    Thesis
  10. 10

    A comparative analysis of software engineering approaches for sequence analysis by Ahmad, M., Jung, L.T., Zaman, N.

    Published 2013
    “…The proposal describes the concepts, tools, methodologies, and algorithms being used for sequence analysis. The sequences contain the precious information that needs to be mined for useful purposes. …”
    Get full text
    Get full text
    Book
  11. 11

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Ideal combination feature selection model for classification problem based on bio-inspired approach by Basir, Mohammad Aizat, Hussin, Mohamed Saifullah, Yusof, Yuhanis

    Published 2020
    “…Such a finding indicates that the exploitation of bio-inspired algorithms with ideal combination of wrapper/filtered method can contribute in finding the optimal features to be used in data mining model construction.…”
    Get full text
    Get full text
    Book Section
  13. 13
  14. 14

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  15. 15
  16. 16

    The future of money: cryptocurrency is the way to go in Malaysia / Dr. Zuraidah Mohamed Isa, Dr. Dahlia Ibrahim and Dr. Mohamad Hanif Abu Hassan by Mohamed Isa, Zuraidah, Ibrahim, Dahlia, Abu Hassan, Mohamad Hanif

    Published 2022
    “…Cryptocurrency is a system that uses computers to mine it, where mining requires the solution of several mathematical algorithms. …”
    Get full text
    Get full text
    Book Section
  17. 17
  18. 18

    Evolving fuzzy grammar for crime texts categorization by Mohd Sharef, Nurfadhlina, Martin, Trevor

    Published 2015
    “…Results show that the EFG algorithm produces results that are close in performance with the other ML methods while being highly interpretable, easily integrated into a more comprehensive grammar system and with lower model retraining adaptability time.…”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions by Saraswati, Galuh Wilujeng

    Published 2017
    “…The project has also implemented the optimization process onto the proposed ANFIS model through the hybrid of Genetic Algorithm on the fuzzy membership function of the ANFIS model. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis