Search Results - (( developing state constitution algorithm ) OR ( java implementation learning algorithm ))

Refine Results
  1. 1

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    An Educational Tool Aimed at Learning Metaheuristics by Kader, Md. Abdul, Jamaluddin, Jamal A., Kamal Z., Zamli

    Published 2020
    “…Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment by Ruzita, Ahmad

    Published 2013
    “…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Improved elitist genetic algorithm for reactive power planning in power system / Mohamad Fadhil Mohd Kamal by Mohd Kamal, Mohamad Fadhil

    Published 2010
    “…The study conducts comparative analyses on the performances of the elitist genetic algorithms (EGA). Modified steady state genetic algorithms (SSGA) and computationally enhanced steady state genetic algorithm (CSGA) in improving the voltage stability and minimizing loss via the optimization of the RPP in power system. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Power System State Estimation In Large-Scale Networks by NURSYARIZAL MOHD NOR, NURSYARIZAL

    Published 2010
    “…Power system state estimation constitutes one of the critical functions that are executed at the control centers. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  10. 10

    Privacy optimization and intrusion detection in modbus/tcp network-based scada in water distribution systems by Franco, Daniel Jose Da Graca Peceguina

    Published 2021
    “…Another problematic aspect is related to the intrusion detection solutions that are based on machine learning cluster algorithms to learn systems’ specifications and extract general state-based rules for attacks identification. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Energy and battery management systems for electrical vehicles: A comprehensive review & recommendations by Challoob A.F., Bin Rahmat N.A., A/L Ramachandaramurthy V.K., Humaidi A.J.

    Published 2025
    “…As such, electric vehicles are the key to achieving sustainable development goals. This review article analyzes deeply the previous technical developments of electric vehicles, focusing on important topics like battery management systems, technologies of power electronics, techniques of charging, and the relevant algorithms and improvements. …”
    Review
  13. 13
  14. 14

    An improved machine learning model of massive Floating Car Data (FCD) based on Fuzzy-MDL and LSTM-C for traffic speed estimation and prediction by Ahanin, Fatemeh

    Published 2023
    “…This behaviour of HMM makes it less effective in estimation of traffic data, because it might be necessary to consider several previous states when estimating a missing state. This thesis uses Fuzzy C-Mean and concept of MDL to constitute patterns and estimate the missing traffic state based on n previous states. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    A Multi-Criteria Decision-Making Approach for Targeted Distribution of Smart Indonesia Card (KIP) Scholarships by Komang, Aryasa

    Published 2025
    “…Education is fundamental to developing quality human resources, as stated in the 1945 Constitution. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Multi-source data fusion framework for remote triaging and prioritization in telemedicine by Salman, Omar Hussein

    Published 2015
    “…As telemedicine consists of three tiers (Sensors/ sources, Base station and Server), the simulation of the proposed frameworks as fusion algorithm in the base station and as healthcare services algorithm in the server was demonstrated. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Computational comparison of major proposed methods for graph partitioning problem by Rais, H.M., Abed, S.A., Watada, J.

    Published 2019
    “…Thus, many research studies have focused on developing meta-heuristic algorithms to tackle the graph partitioning problem. …”
    Get full text
    Get full text
    Article
  19. 19
  20. 20

    Development Of Finite Element Codes For Shear Wall Analysis by Paknahad, Masoud

    Published 2008
    “…In this study, new elements have been developed, modified constitutive law has been proposed, new computational algorithm has been utilised. …”
    Get full text
    Get full text
    Thesis