Search Results - (( evolution optimization mining algorithm ) OR ( java information source algorithm ))
Search alternatives:
- evolution optimization »
- information source »
- mining algorithm »
- java information »
- source algorithm »
-
1
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
2
Y-type Random 2-satisfiability In Discrete Hopfield Neural Network
Published 2024“…During the retrieval phase, a new activation function and Swarm Mutation were proposed to ensure the diversity of the neuron states. The proposed algorithm and mutation mechanism showed optimal performances as compared to the existing algorithms. …”
Get full text
Get full text
Thesis -
3
Logic mining method via hybrid discrete hopfield neural network
Published 2025“…The first contribution involves the incorporation of a Hybrid Differential Evolution Algorithm to accelerate the optimization of synaptic weights during the training phase. …”
Get full text
Get full text
Get full text
Article -
4
Multi-Objective Hybrid Algorithm For The Classification Of Imbalanced Datasets
Published 2019“…A new self-adaptive hybrid algorithm (CSCMAES) is introduced for optimization. …”
Get full text
Get full text
Thesis -
5
Seed disperser ant algorithm for optimization / Chang Wen Liang
Published 2018“…The Seed Disperser Ant Algorithm (SDAA) is developed based on the evolution or expansion process of Seed Disperser Ant (Aphaenogaster senilis) colony. …”
Get full text
Get full text
Get full text
Thesis -
6
Classification with degree of importance of attributes for stock market data mining
Published 2004“…The experimental results show that predictive FDT algorithm can generate a relatively optimal tree without much computation effort (comprehensibility), and WFPRs have a better predictive accuracy of stock market time series data. …”
Get full text
Get full text
Article -
7
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…An attacker can easily reconstruct source code from such intermediate formats to extract sensitive information such as proprietary algorithms present in the software. …”
Get full text
Get full text
Thesis -
8
-
9
Descriptive analysis of patient diet trends at Pantai Hospital Ayer Keroh
Published 2025“…Without effective data analysis, it is challenging to track dietary trends, assess patient preferences, and optimize meal preparation. To address this problem, this project focuses on enhancing various aspects of healthcare dietary operations by employing CRISP-DM as the methodology to structure the data mining process. …”
Get full text
Get full text
Student Project -
10
Constrained clustering approach to aid in remodularisation of object-oriented software systems / Chong Chun Yong
Published 2016“…Apart from the explicit clustering constraints from domain experts, other sources of information to guide and improve clustering results can be derived implicitly from the source code itself. …”
Get full text
Get full text
Thesis -
11
Mobile Vision-based Automatic Counting of Bacteria Colonies
Published 2017Get full text
Get full text
Get full text
Article -
12
-
13
-
14
Class binarization with self-adaptive algorithm to improve human activity recognition
Published 2018“…Therefore, feature selection using Relief-f with self-adaptive Differential Evolution (rsaDE) algorithm is proposed to select the most significant features. …”
Get full text
Get full text
Thesis -
15
-
16
SecPath: Energy efficient path reconstruction in wireless sensor network using iterative smoothing
Published 2019“…To achieve energy efficiency, it compresses the packet information by using GZIP tools in JAVA. SecPath is evaluated with several variations using 400 nodes in WSN deployments as well as large-scale simulations. …”
Get full text
Get full text
Thesis -
17
Energy efficient path reconstruction in wireless sensor network using iPath
Published 2019“…To achieve energy efficiency, it compresses the packet information by using GZIP tools in JAVA. Energy efficient iPath (E-iPath) is evaluated with several variations of nodes in WSN deployments as well as large-scale simulations. …”
Get full text
Get full text
Get full text
Article -
18
Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions
Published 2017“…Two sets of experimental data involving 20 diabetic patients and 20 healthy subjects were collected from CITO laboratory Semarang Central Java, Indonesia. Ethics consents were informed and agreed by the subjects before starting the data collection. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
19
Evolutionary cost-cognizant regression test case prioritization for object-oriented programs
Published 2019“…Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
Get full text
Get full text
Thesis
