Search Results - (( developing effective transformative algorithm ) OR ( java implementation learning algorithm ))

Refine Results
  1. 1

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    An Educational Tool Aimed at Learning Metaheuristics by Kader, Md. Abdul, Jamaluddin, Jamal A., Kamal Z., Zamli

    Published 2020
    “…Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment by Ruzita, Ahmad

    Published 2013
    “…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Enhancement of Single and Composite Images Based on Contourlet Transform Approach by Melkamu, Hunegnaw Asmare

    Published 2009
    “…Image enhancement is an imperative step in almost every image processing algorithms. Numerous image enhancement algorithms have been developed for gray scale images despite their absence in many applications lately. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Development of an interactive learning tool for analysis of fast fourier transform from butterfly diagram by Mohamad Syeihri Bin Mohamad Ismail

    Published 2023
    “…Thus, the development of the software will be useful to study the effect of varying parameter and to identify the difference between the algorithm of Decimation-in-Time (DIT) and Decimation-in-Frequency (DIF).…”
    text::Thesis
  9. 9

    Industry 5.0 and Education 5.0: Transforming Vocational Education through Intelligent Technology by Zhang, Hongli, Leong, Wai Yie

    Published 2024
    “…This paper aims to explore how intelligent technology can transform vocational education to enhance the effectiveness of vocational training and meet the demands of the modern economy. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  11. 11

    An improved split-stepwavelet transform method for anomalous radiowave propagation modeling by Iqbal, A., Jeoti, V.

    Published 2014
    “…A large number of numerical experiments are carried out to validate the performance of the proposed algorithm. Developed algorithm is compared with previously published techniques; Wavelet Galerkin Method (WGM) and Split-Step Fourier transform Method (SSFM). …”
    Get full text
    Get full text
    Article
  12. 12
  13. 13

    Development of a new algorithm for segmentation of flotation froth images by Jahedsaravani, Ali, Marhaban, Mohammad Hamiruce, Massinaei, Mohammad, Saripan, M. Iqbal, Mehrshad, Naser, Mohd Noor, Samsul Bahari

    Published 2014
    “…In the paper, the marker-based watershed method is modified to prevent oversegmentation of large bubbles. The developed algorithm is validated using some froth images captured at different operating conditions, so the results indicate that the method can segment the mixture of big and small bubbles effectively.…”
    Get full text
    Get full text
    Article
  14. 14

    COMPUTER AIDED SYSTEM FOR BREAST CANCER DIAGNOSIS USING CURVELET TRANSFORM by MOHAMED ELTOUKHY, MOHAMED MESELHY

    Published 2011
    “…The main goal is to increase the diagnostic accuracy rate. In this thesis we developed a computer aided system for the diagnosis and detection of breast cancer using curvelet transform. …”
    Get full text
    Get full text
    Thesis
  15. 15

    loformation Retrieval - using Porter Stemming Algorithm by Zulkifly, Zurida Azita

    Published 2006
    “…However, the main focus of this project is on Porter Stemming Algorithm which has been developed by M.F Porter in 1980. …”
    Get full text
    Get full text
    Final Year Project
  16. 16

    Data Transformation Model For Addressing Incomplete And Inconsistent Quality Issues Of Big Data by Onyeabor, Grace Amina

    Published 2024
    “…The study was evaluated using the developed model and benchmarked with existing data transformation techniques in the literature. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Development of an intelligent system using Kernel-based learning methods for predicting oil-palm yield. by Md. Sap, Mohd. Noor, Awan, A. Majid

    Published 2005
    “…The proposed algorithm can effectively handle noise, outliers and auto-correlation in the spatial data, for effective and efficient data analysis by exploring patterns and structures in the data, and thus can be used for predicting oil-palm yield by analyzing various factors affecting oil-palm yield.…”
    Get full text
    Get full text
    Article
  18. 18

    Enhancement of medical image compression algorithm in noisy WLANS transmission by Algaet, Mustafa Almahdi

    Published 2018
    “…For image reconstruction,decoding steps based the developed quantization architecture are examined.The EICA is particularly useful where the size of the transmitted data needs to be reduced to minimize the image transmission time.For data compression with suitable and effective performance,enhanced independent components analysis (EICA) is proposed as an algorithm for compression and decompression of medical data.A comparative analysis is performed based on existing data compression techniques:discrete cosine transform (DCT), set partitioning in hierarchical trees (SPIHT),and Joint Photographic Experts Group (JPEG 2000).Three main modules,namely,compression segment (CS),transceiver segment (TRS),and outcome segment (OTS) modules,are developed to realize a fully computerized simulation tool for medical data compression with suitable and effective performance.To compress medical data using algorithms,CS module involves four different approaches which are DCT, SPIHT,JPEG 2000 and EICA.TRS module is processed by low-cost WLANs with low-bandwidth transmission.Finally,OTS is used for data decompression and visualization result.In terms of compression module,results show the benefits of applying EICA in medical data compression and transmission.While for system design,the developed system displays favorable outcomes in compressing and transmitting medical data.In conclusion,all three modules (CS,TRS,and OTS) are integrated to yield a computerized prototype named as Medical Data Simulation System(Medata-SIM) computerized system that includes medical data compression and transceiver for visualization to aid medical practitioners in carrying out rapid diagnoses.…”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    A novel discrete wavelet transform-based graphical language classifier for identification of high-impedance fault in distribution power system by Veerasamy, Veerapandiyan, Abdul Wahab, Noor Izzri, Vinayagam, Arangarajan, Othman, Mohammad Lutfi, Ramachandran, Rajeswari, Inbamani, Abinaya, Hizam, Hashim

    Published 2020
    “…This paper proposes a discrete wavelet transform (DWT)-based Graphical Language classifier algorithm for identification of high-impedance fault (HIF) in medium voltage (MV) distribution network of 13.8 kV. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    A block cipher based on genetic algorithm by Zakaria, Nur Hafiza

    Published 2016
    “…The development of block ciphers have resulted in a number of cryptographic algorithms such as, AES, ARIA, BLOWFISH256, DESL, 3D-AES and many more. …”
    Get full text
    Get full text
    Get full text
    Thesis