Search Results - (( developing world context algorithm ) OR ( java implementation learning algorithm ))

Refine Results
  1. 1

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    An Educational Tool Aimed at Learning Metaheuristics by Kader, Md. Abdul, Jamaluddin, Jamal A., Kamal Z., Zamli

    Published 2020
    “…Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment by Ruzita, Ahmad

    Published 2013
    “…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  8. 8
  9. 9

    Old Jawi manuscript: Digital recognition / Zaidi Razak by Zaidi, Razak

    Published 2016
    “…The information gathered is useful for the development of a line segmentation algorithm, a new character segmentation algorithm, as well as a recognition algorithm which is based on the use of a unique code and Hamming distance calculation. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Context-Aware Recommender System based on machine learning in tourist mobile application / Nor Liza Saad … [et al.] by Saad, Nor Liza, Khairudin, Nurkhairizan, Azizan, Azilawati, Abd Rahman, Abdullah Sani, Ibrahim, Roslina

    Published 2022
    “…For the initial framework, the tourist mobile application prototype was developed based on Penang tourist areas by using Waterfall Model system development approach. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Algorithm for the legal regulation of internet financial crime by Ambaras Khan, Hanna, Ab. Rahman, Suhaimi, Xinxin, Mao

    Published 2024
    “…The study on the legal regulation of Internet financial crime holds significant importance in the context of the rapid development of China’s Internet finance and the increasing prevalence of crime in this sector. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Jawi recognition system by Nur Aziela, Mansor

    Published 2010
    “…From a dominant writing in Malay world, the usage of Jawi is confined mostly in Islamic religious context nowadays. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  13. 13

    Efficient management of Top-k queries over Uncertain Data Streams with dynamic Sliding Window Model by Raja Wahab, Raja Azhan Syah

    Published 2024
    “…The algorithm development combines the frameworks from Phases 1 to 3, evaluating real and synthetic datasets. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    A decomposed streamflow non-gradientbased artificial intelligence forecasting algorithm with factoring in aleatoric and epistemic variables / Wei Yaxing by Wei , Yaxing

    Published 2024
    “…The firefly algorithm remains a feasible alternative for shallow architectural network models, while metaheuristic algorithms such as the Particle swarm algorithm and Bat algorithm are better options for deeper architectural network models. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Developing computational thinking competencies through constructivist argumentation learning: a problem-solving perspective by Voon, Xin Pei, Wong, Su Luan, Wong, Lung Hsiang, Md Khambari, Mas Nida, Syed Abdullah, Sharifah Intan Sharina

    Published 2022
    “…In this article, we propose a framework that conceptualizes the constructivist argumentation as a context for problem-solving by applying five computational thinking dimensions, viz. algorithmic design, decomposition, abstraction, evaluation, and generalization. …”
    Get full text
    Get full text
    Article
  16. 16

    Performance evaluation of mobile ad hoc network in wireless LAN / Norfadhilah Hasan by Hasan, Norfadhilah

    Published 2005
    “…Mobile Ad-hoc Network (MANET) is becoming increasingly important in today's world and a number of protocols have been developed for them. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    Discrete-time system identification using genetic algorithm with single parent-based mating technique by Zainuddin, Farah Ayiesya

    Published 2024
    “…The successful validation in real-world systems marks a significant milestone, showing that the SPM technique can significantly improve model optimization in diverse and practical contexts . …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20