Search Results - (( developing affecting force algorithm ) OR ( java implementation learning algorithm ))

Refine Results
  1. 1

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    An Educational Tool Aimed at Learning Metaheuristics by Kader, Md. Abdul, Jamaluddin, Jamal A., Kamal Z., Zamli

    Published 2020
    “…Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment by Ruzita, Ahmad

    Published 2013
    “…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Node placement optimization using extended virtual force and cuckoo search algorithm in wireless sensor network by Puteri Azwa, Ahmad

    Published 2014
    “…This study proposed Extended Virtual Force and Cuckoo Search (EVFCS) algorithm with a combination of EVFA and CS algorithm to find an optimal node placement. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Regenerative braking strategy for electric vehicles using improved adaptive genetic algorithm by Taleghani, Hussein

    Published 2017
    “…This braking force distribution affects vehicles stability while braking. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Real-time measurement and gait detection algorithm for motion control of active ankle foot orthosis / Aminuddin Hamid by Hamid, Aminuddin

    Published 2015
    “…The Active ankle foot orthosis (AAFO) has been developed to overcome this problem by assisting the motion of the ankle complex based on force controlled actuator. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  12. 12
  13. 13

    Effect of bed vicinity on vortex shedding and force coefficients of fluid flow on an offshore pipeline by Namazi-saleh, F., Kurian, V.J., Mustaffa, Z., Tahan, M., Kim, D.

    Published 2017
    “…Evaluation of the developed numerical model shows that the proposed technique is capable of properly predicting hydrodynamic forces and simulating the flow pattern. …”
    Get full text
    Get full text
    Article
  14. 14

    A new estimation of nonlinear contact forces of railway vehicle by Khakoo Mal, Imtiaz Hussain Kalwar, Khurram Shaikh, Tayab Din Memon, Bhawani Shankar Chowdhry, Kashif Nisar, Manoj Gupta

    Published 2021
    “…However, it is hard to find the status of this adhesion force due to its complexity, highly non-linear nature, and also affected with an unpredictable operation environment. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Improving automatic forced alignment for phoneme segmentation in Quranic recitation by Alqadasi, Ammar Mohammed Ali, Khedher, Akram M Z M, Sunar, Mohd Shahrizal, Hj Salam, Md. Sah, Abdulghafor, Rawad, Khaled, Nashwan Abdo

    Published 2024
    “…These enhancements encompass the adaptation of an acoustic model tailored for Qur’anic recitation as preprocessing and culminate in the development of an algorithm aimed at refining forced alignment based on the phonetic nuances of the Qur’an. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  16. 16
  17. 17

    Machine learning model to predict the contact of angle using mineralogy, TOC and process parameters in shale by Ameenuddin Irfan, S., Fadhli, M.Z., Padmanabhan, E.

    Published 2021
    “…Wettability is the capability of a liquid to remain in contact with a solid surface affected by the balance of both intermolecular force of adhesive force (liquid to surface) and cohesive force (liquid-liquid). …”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    A New Cell Formation Method Considering Operation Sequences And Production Volumes by Abedini, Panteha

    Published 2013
    “…The graph theory was employed to develop the algorithm. It consists of four stages that the first one shows the sequences of machines that are used by each part in a graph. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    Cash-flow analysis of a wind turbine operator by Muhamad Razali N.M., Hashim A.H.

    Published 2023
    “…The paper outlines a method to evaluate the distribution of WTG operator's daily cash-flow by developing an algorithm based on Monte-Carlo technique. …”
    Conference Paper