Search Results - (( developing interactive teaching algorithm ) OR ( java extraction method algorithm ))
Search alternatives:
- developing interactive »
- interactive teaching »
- teaching algorithm »
- extraction method »
- method algorithm »
- java extraction »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The proposed method, XiFLEX has been implemented using two different techniques (java based & XQuery) and compared with the original FLEX algorithm in its basic implementation and the Apriori algorithm for frequent patterns generation. …”
Get full text
Get full text
Thesis -
2
On Adopting Parameter Free Optimization Algorithms for Combinatorial Interaction Testing
Published 2015“…In doing so, this paper reviews two existing parameter free optimization algorithms involving Teaching Learning Based Optimization (TLBO) and Fruitfly Optimization Algorithm (FOA) in an effort to promote their adoption for CIT.…”
Get full text
Get full text
Get full text
Article -
3
Visualization Tool for Pathfinding Algorithms
Published 2023“…Furthermore, the tool serves as a valuable resource for educators, facilitating the teaching of pathfinding algorithms in a more engaging and interactive manner. …”
Get full text
Get full text
Final Year Project Report / IMRAD -
4
Image clustering comparison of two color segmentation techniques
Published 2010“…There are many algorithm for analysing clustering each having its own method to do clustering. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
Mapreduce algorithm for weather dataset
Published 2017“…This original dataset is stored in Hadoop Distributed File System. Next, MapReduce Algorithm is developed using Java programming. The algorithm is tested using small and big dataset. …”
Get full text
Get full text
Thesis -
6
Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
Published 2009“…The strength of the information hiding science is due to the non-existence of standard algorithms to be used in hiding secret messages. Also there is randomness in hiding methods such as combining several media (covers) with different methods to pass a secret message. …”
Get full text
Get full text
Get full text
Article -
7
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
Get full text
Get full text
Get full text
Thesis -
8
Integrating of web 2.0 technologies for interactive courseware : data structure and algorithm as case study
Published 2013“…The intention of the developed courseware is not to replace conventional class, but the develop courseware main objective is to assist students of FCSIT for better understanding towards Data Structure and Algorithms Course (TMC1433) through interactive delivering information.…”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
9
MapReduce algorithm for weather dataset
Published 2018“…This original dataset is stored in Hadoop Distributed File System. Next, MapReduce Algorithm is developed using Java programming. The algorithm is tested using small and big dataset. …”
Get full text
Get full text
Research Report -
10
The application of computer aided design and manufacturing (CAD/CAM) for teaching aid / Noorashidi Nazari
Published 1991“…The software was written in AutoLISP (Artificial Intelligent) to transfer part programming with interactive CAD. The system also automatically produces tapes for conventional NC machine tools, which are used as teaching aid for the undergraduate students to study NC part programming and familiarize with interactive graphics on CAD. …”
Get full text
Get full text
Student Project -
11
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…Recent research has focused on analysing Android Intent in the XML file. We propose a new method of analysing Android Intent in Java code, which includes implicit intent and explicit intent. …”
Get full text
Get full text
Get full text
Thesis -
12
Software module clustering based on the fuzzy adaptive teaching learning based optimization algorithm
Published 2019Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
Face classification for three major ethnic of Orang Asli using Back Propagation Neural Network / Nor Intan Shafini Nasaruddin
Published 2012“…The image classification prototype is developed by using JAVA programming language which is based on supervised learning algorithm, Backpropagation Neural Network. …”
Get full text
Get full text
Thesis -
14
Development Of Machine Learning User Interface For Pump Diagnostics
Published 2022“…The data collected for this machine learning model is using the statistically significant features from vibration and acoustic analysis. The features extracted of time domain and frequency domain in vibration and acoustic will use as database of a Support Vector Machine (SVM) algorithms by using MATLAB R2021a. …”
Get full text
Get full text
Monograph -
15
EVT571: Environmental Remote Sensing / Faculty of Applied Sciences
Published 2020Get full text
Get full text
Get full text
Teaching Resource -
16
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…An attacker can easily reconstruct source code from such intermediate formats to extract sensitive information such as proprietary algorithms present in the software. …”
Get full text
Get full text
Thesis -
17
A fuzzy adaptive teaching learning-based optimization strategy for generating mixed strength t-way test suites
Published 2019“…Many test data generation strategies based on meta-heuristic algorithms such as Simulated Annealing (SA), Tabu Search (TS), Genetic Algorithm (GA), Ant Colony Optimization (ACO), Particle Swarm Optimization (PSO), Harmony Search (HS), Cuckoo Search (CS), Bat Algorithm (BA) and Bees Algorithm have been developed in recent years. …”
Get full text
Get full text
Thesis -
18
An evaluation of Monte Carlo-based hyper-heuristic for interaction testing of industrial embedded software applications.
Published 2020“…Hyper-heuristic is a new methodology for the adaptive hybridization of meta-heuristic algorithms to derive a general algorithm for solving optimization problems. …”
Get full text
Get full text
Get full text
Article -
19
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…The methodology is based on JavaScript and PHP languages for developing a new technique called DetectCombined capable of filtering queries using parameterized queries to protect against SQL injection which is a safe method. …”
Get full text
Get full text
Get full text
Article -
20
CT-eKit: computational thinking interactive learning / Ong Sing Ling, Jill Ling and Fetylyana Nor Pazilah
Published 2023“…Hence, this innovation aims to innovate a CTeKit, a collective teaching aid that emphasises Inquiry-based learning (IBL), developed to facilitate the learning process on the CT topic. …”
Get full text
Get full text
Book Section
