Search Results - (( developing voting based algorithm ) OR ( java implementation some algorithm ))

Refine Results
  1. 1

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Improved voting technique for ensemble of MLP system applied on various classification data / Saodah Omar, Iza Sazanita Isa and Junita Mohd Saleh. by Omar, Saodah, Isa, Iza Sazanita, Mohd Saleh, Junita

    Published 2010
    “…The work employs MATLAB Neural Network Toolbox and Borland C++ programming language as the tools to develop the proposed system. The MLP networks are trained using two types of learning algorithm, which are the Levenberg Marquardt and the Resilient Back Propagation algorithms. …”
    Get full text
    Get full text
    Research Reports
  4. 4

    Secure E-Voting With Blind Signature by Ibrahim, Subariah, Kamat, Maznah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…We have developed an electronic voting system, E-Voting for a general election. …”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Route Optimization System by Zulkifli, Abdul Hayy

    Published 2005
    “…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
    Get full text
    Get full text
    Final Year Project
  6. 6

    Design and Implementation of Data-at-Rest Encryption for Hadoop by Wan Nor Shuhadah, Wan Nik, Mohamad Afendee, Mohamed, Zarina, Mohamad, Siti Hanisah, Kamaruzaman

    Published 2017
    “…It is shown that the implementation of AES encryption algorithm is capable to secure data stored in HDFS to some extent.…”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Design and Implementation of Data-at-Rest Encryption for Hadoop by Wan Nor Shuhadah, Wan Nik, Mohamad Afendee, Mohamed, Zarina, Mohamad, Siti Hanisah, Kamaruzaman

    Published 2017
    “…It is shown that the implementation of AES encryption algorithm is capable to secure data stored in HDFS to some extent.…”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Classification of Mental Health Level of Students Using SMOTE and Soft Voting Ensemble Classifier and the DASS-21 Profile by Muhammad Imron, Rosadi, Khoirun, Nisa, Nanik, Kholifah

    “…It leverages the Synthetic Minority Over-sampling Technique (SMOTE) to address the class imbalance in the dataset and employs a Voting Ensemble with soft voting to combine several base algorithms (Logistic Regression, Random Forest, Gradient Boosting, and XGBoost/SVM) for accurate prediction of mental health levels (normal, mild, moderate, severe, very severe). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
    Get full text
    Get full text
    Thesis
  10. 10

    A voting-based hybrid machine learning approach for fraudulent financial data classification / Kuldeep Kaur Ragbir Singh by Kuldeep Kaur , Ragbir Singh

    Published 2019
    “…The voting-based hybrid approach consisting of various machine learning models with the ability to tackle issues related to missing and imbalanced data is then developed. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    An improved multiple classifier combination scheme for pattern classification by Abdullah,

    Published 2015
    “…The ant system (AS) algorithm is used to partition feature set in developing feature subsets which represent the number of classifiers. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Ant system and weighted voting method for multiple classifier systems by Husin, Abdullah, Ku-Mahamud, Ku Ruhana

    Published 2018
    “…A diverse classifier ensemble is constructed by training them with different feature set partitions. The ant system-based algorithm is used to form the optimal feature set partitions. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Fuzzy modeling using Bat Algorithm optimization for classification by Noor Amidah, Ahmad Sultan

    Published 2018
    “…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  14. 14

    Implementation of RIO in UMJaNetSim / Chan Chin We by Chan, Chin We

    Published 2004
    “…In this project, I will do some research on the recent TCP congestion control and avoidance mechanisms and implement one of the mechanisms into the Java Network Simulator (JaNetSim). …”
    Get full text
    Get full text
    Thesis
  15. 15

    Making programmer effective for software development teams: An extended study by Gilal, A.R., Jaafar, J., Abro, A., Umrani, W.A., Basri, S., Omar, M.

    Published 2017
    “…Results emanated from training experiments were validated with Standard Voting (SV), Voting with Object tracking, and Naïve Bayes classification techniques based on prediction accuracy. …”
    Get full text
    Get full text
    Article
  16. 16

    Nearest neighbour group-based classification by Samsudin, Noor A., Bradley, Andrew P.

    Published 2010
    “…In this paper, we extend three variants of the nearest neighbour algorithm to develop a number of non-parametric group-based classification techniques. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Comparison of performances of Jaya Algorithm and Cuckoo Search algorithm using benchmark functions by Ahmed, Mashuk, Nasser, Abdullah B., Kamal Z., Zamli, Heripracoyo, Sulistyo

    Published 2022
    “…This paper aims to compare the performance of two metaheuristic algorithms which are Jaya Algorithm (JA) and Cuckoo Search (CS) using some common benchmark functions. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    TOPSIS-based Regression Algorithms Evaluation by Abu-Shareha, Ahmad Adel

    Published 2022
    “…Following that, using three datasets, namely Combined Cycle Power Plant, Real Estate, and Concrete, Voting using multiple classifiers (k-means-based classifiers) was the top-ranked in the Combined Cycle Power Plant and Real Estate datasets. …”
    Get full text
    Get full text
    Article
  19. 19
  20. 20

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
    Get full text
    Get full text
    Thesis