Search Results - (( java _ implementation algorithm ) OR ( ((program code) OR (program case)) learning algorithm ))

Refine Results
  1. 1

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Performances Of Metaheuristic Algorithms In Optimizing Tool Capacity Allocations by Goheannee

    Published 2014
    “…The demand scenarios were with different demand intensities and levels. For each case study, a capacity model was constructed in Microsoft Excel spreadsheet, as an input to the above mentioned metaheuristic algorithms which programmed in Matlab coding. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Experimental implementation controlled SPWM inverter based harmony search algorithm by Najeeb M., Mansor M., Razali R., Daniyal H., Yahaya J.A.F.

    Published 2023
    “…C (programming language); Controllers; Electric inverters; Errors; Learning algorithms; MATLAB; Particle swarm optimization (PSO); Pulse width modulation; Voltage control; And transient response; C code for the sine PWM; C++ codes; Ezdsp f28335 board; Harmony search algorithm; Harmony search algorithms; Mean absolute error; Pulse width modulation inverters; Sinusoidal pulsewidth modulations (SPWM); Transient analysis…”
    Article
  5. 5

    Object-Oriented Programming semantics representation utilizing agents by Mohd Aris, Teh Noranis

    Published 2011
    “…Learning programming from source code examples is a common behavior among novices. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    An evaluation of Monte Carlo-based hyper-heuristic for interaction testing of industrial embedded software applications. by S. Ahmed, Bestoun, Enoiu, Eduard, Afzal, Wasif, Kamal Z., Zamli

    Published 2020
    “…The limited application of combinatorial test generation on industrial programs can impact the use of such techniques as Q-EMCQ. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…Today, with online marketing, banking, healthcare and other services, even the average householder is aware of encryption. The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  8. 8

    A preliminary study of difficulties in learning java programming for secondary school by Majalin, M., Aslina Baharum, Ismail, R., Ismail, I., Ervin Gubin Moung, Noor, N.A.M.

    Published 2020
    “…One of the problems is students have difficulty in certain subtopics of programming. Coding to a specific task by using much complex algorithm is not an easy task as student needs to understand and know how to use it to solve a problem. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Provider independent cryptographic tools by Ibrahim, Subariah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
    Get full text
    Get full text
    Get full text
    Monograph
  10. 10

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  11. 11

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Algorithm-program visualization model : An intergrated software visualzation to support novices' programming comprehension by Affandy

    Published 2015
    “…The programming performances from the treatment and control group are compared to analyze the effect of using the proposed tool in learning programming. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Computerized simulation system for ECM radar system by Salleh, Mohamad Sabri

    Published 2007
    “…Next sequence diagrams were used to view the internal process within the simulation system. Finally before code generation, the flow chart of the simulation algorithm was used. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Case Slicing Technique for Feature Selection by A. Shiba, Omar A.

    Published 2004
    “…The classification accuracy obtained from the CST method is compared to other selected classification methods such as Value Difference Metric (VDM), Pre-Category Feature Importance (PCF), Cross-Category Feature Importance (CCF), Instance-Based Algorithm (IB4), Decision Tree Algorithms such as Induction of Decision Tree Algorithm (ID3) and Base Learning Algorithm (C4.5), Rough Set methods such as Standard Integer Programming (SIP) and Decision Related Integer Programming (DRIP) and Neural Network methods such as the Multilayer method.…”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    'Chapter 7: Smartphone penetration test: Securing Industry 5.0 mobile applications' in "1st Edition, The Future of Human-Computer Integration Industry 5.0 Technology, Tools, and Al... by Eka Wahyu, Aditya, Nur Haryani, Zakaria, Fazli, Azzali, Mohamad Nazim, Jambli

    Published 2024
    “…Topics in this book include the role of AI in human-computer interaction, efficient asset management using blockchain, computational thinking in program development, synergy of 5G and IoT in healthcare services, advances in increasing data capacity of QR codes, and personalised user experience with augmented reality. …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  17. 17

    Performance evaluation of real-time multiprocessor scheduling algorithms by Alhussian, H., Zakaria, N., Abdulkadir, S.J., Fageeri, S.O.

    Published 2016
    “…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Algorithm as a problem solving technique for teaching and learning of the Malay language by Nazir, Faridah, Jano, Zanariah, Omar, Norliza

    Published 2019
    “…Students are also excited about the algorithmic techniques and the scratch program generated. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  19. 19

    Algorithm As A Problem Solving Technique For Teaching And Learning Of The Malay Language by Jano, Zanariah, Omar, Norliza, Nazir, Faridah

    Published 2019
    “…Students are also excited about the algorithmic techniques and the scratch program generated. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Demystifying Artificial Intelligence (AI) for Early Childhood and Elementary Education: A Case Study of Perceptions of AI of State of Missouri Educators by Arnone, K., Hutson, J., Woodruff, K.

    Published 2023
    “…Future uses of AI will include the following: enabling engaging and interactive education anytime and anywhere; personalized AI mentors that will help students identify and reach their goals; and mass-personalization that will allow AI to be tailored to each student’s learning style, level, and needs. Yet with all the potential benefits that AI and machine learning (ML) may provide students, there remains a general reticence to adopt this technology because of misconceptions and perceptions that elementary educators will need expensive equipment, robust support from IT, or to retool and learn programming or coding. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article