Search Results - (( developing modality learning algorithm ) OR ( java implementation some algorithm ))

Refine Results
  1. 1

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Route Optimization System by Zulkifli, Abdul Hayy

    Published 2005
    “…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
    Get full text
    Get full text
    Final Year Project
  4. 4

    Adaptive Neuro Fuzzy Inference System (ANFIS) and Artificial Neural Networks (ANNs) for structural damage identification by Hakim, S.J.S., Abdul Razak, H.

    Published 2013
    “…However the proposed ANFIS architecture using hybrid learning algorithm was found to perform better than the multilayer feedforward ANN which learns using the backpropagation algorithm. …”
    Get full text
    Get full text
    Article
  5. 5

    Operational structural damage identification using de-noised modal feature in machine learning / Chen Shilei by Chen , Shilei

    Published 2021
    “…By integrating ISMA, both supervised and unsupervised machine learning algorithms were investigated to develop real-time damage identification schemes. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Effect of different modalities of facial images for diagnosis of ASD by deep neural network by Rashid, Muhammad Mahbubur, Alam, Mohammad Shafiul, Haque, M A, Ali, Mohammad Yeakub, Yvette, Susiapan

    Published 2024
    “…This research aims to explore the potential of various facial image types in diagnosing Autism Spectrum Disorder (ASD) through the application of deep learning neural networks. It delves into how deep learning algorithms perform with different facial image modalities, especially 2D and 3D, while addressing specific challenges associated with each. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  7. 7

    Design and Implementation of Data-at-Rest Encryption for Hadoop by Wan Nor Shuhadah, Wan Nik, Mohamad Afendee, Mohamed, Zarina, Mohamad, Siti Hanisah, Kamaruzaman

    Published 2017
    “…It is shown that the implementation of AES encryption algorithm is capable to secure data stored in HDFS to some extent.…”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Design and Implementation of Data-at-Rest Encryption for Hadoop by Wan Nor Shuhadah, Wan Nik, Mohamad Afendee, Mohamed, Zarina, Mohamad, Siti Hanisah, Kamaruzaman

    Published 2017
    “…It is shown that the implementation of AES encryption algorithm is capable to secure data stored in HDFS to some extent.…”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Fuzzy modeling using Bat Algorithm optimization for classification by Noor Amidah, Ahmad Sultan

    Published 2018
    “…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  11. 11

    Data mining for structural damage identification using hybrid artificial neural network based algorithm for beam and slab girder / Meisam Gordan by Meisam , Gordan

    Published 2020
    “…To this end, experimental modal analysis of aforesaid structures was carried out by introducing different damage scenarios to generate the modal parameter database. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Implementation of RIO in UMJaNetSim / Chan Chin We by Chan, Chin We

    Published 2004
    “…In this project, I will do some research on the recent TCP congestion control and avoidance mechanisms and implement one of the mechanisms into the Java Network Simulator (JaNetSim). …”
    Get full text
    Get full text
    Thesis
  13. 13

    Comparison of performances of Jaya Algorithm and Cuckoo Search algorithm using benchmark functions by Ahmed, Mashuk, Nasser, Abdullah B., Kamal Z., Zamli, Heripracoyo, Sulistyo

    Published 2022
    “…This paper aims to compare the performance of two metaheuristic algorithms which are Jaya Algorithm (JA) and Cuckoo Search (CS) using some common benchmark functions. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14
  15. 15

    Recent Automatic Segmentation Algorithms of MRI Prostate Regions: A Review by Khan, Z., Yahya, N., Alsaih, K., Al-Hiyali, M.I., Meriaudeau, F.

    Published 2021
    “…This survey reviewed 22 machine learning and 88 deep learning-based segmentation of prostate MRI papers, including all MRI modalities. …”
    Get full text
    Get full text
    Article
  16. 16

    Recent Automatic Segmentation Algorithms of MRI Prostate Regions: A Review by Khan, Z., Yahya, N., Alsaih, K., Al-Hiyali, M.I., Meriaudeau, F.

    Published 2021
    “…This survey reviewed 22 machine learning and 88 deep learning-based segmentation of prostate MRI papers, including all MRI modalities. …”
    Get full text
    Get full text
    Article
  17. 17

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Priority and dynamic quantum time algorithms for central processing unit scheduling by Mohammed, Maysoon A.

    Published 2018
    “…In excel, a graph has been produced to show the minimum and maximum values of the new dynamic quantum time after setting the parameters of the proposed formula (priority, burst time and the current quantum time). The proposed algorithms (Priority Dynamic Quantum Time and Multi Priority Dynamic Quantum Time Algorithms) are implemented using JAVA programming language and validated using Key Performance Indicators equations. …”
    Get full text
    Get full text
    Thesis
  19. 19

    A cognitive mapping approach in real-time haptic rendering interaction for improved spatial learning ability among autistic people / Kesavan Krishnan by Kesavan , Krishnan

    Published 2024
    “…Meanwhile, in the past decade, the use of haptic technology in autism has increased in terms of various disciplines that can assist in improving their learning skills. Nevertheless, the use of haptic technology in terms of spatial learning is still not fully utilized, and this weakens autistic people in the process of learning about their surroundings. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    A decomposed streamflow non-gradientbased artificial intelligence forecasting algorithm with factoring in aleatoric and epistemic variables / Wei Yaxing by Wei , Yaxing

    Published 2024
    “…The dissertation aims to develop an effectively decomposed time-series nongradient- based artificial intelligence model for forecasting a time-series regression machine learning task. …”
    Get full text
    Get full text
    Get full text
    Thesis