Search Results - (( java implementation case algorithm ) OR ( pattern extraction efficient algorithm ))

Refine Results
  1. 1

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Improving mining efficiency: A new scheme for extracting association rules by Said, Aiman Moyaid, Dominic, P D D., Abdullah, Azween

    Published 2009
    “…In the age of information technology, the amount of accumulated data is tremendous. Extracting the association rule from this data is one of the important tasks in data mining.Most of the existing association rules in algorithms typically assume that the data set can fit in the memory.In this paper, we propose a practical and effective scheme to mine association rules from frequent patterns, called Prefixfoldtree scheme (PFT scheme).The original dataset is divided into folds, and then from each fold the frequent patterns are mined by using the tree projection approach.These frequent patterns are combined into one set and finally interestingness constraints are used to extract the association rules.The experiments will be conducted to illustrate the efficiency of our scheme.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Pairwise testing tools based on hill climbing algorithm (PTCA) by Lim, Seng Kee

    Published 2014
    “…The actual implementation of the algorithm which is in Java programming language, the program is implemented on Net Bean 7.0.1. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  5. 5
  6. 6

    Java based expert system for selection of natural fibre composite materials by Ahmed Ali, Basheer A., Salit, Mohd Sapuan, Zainudin, Edi Syams, Othman, Mohamed

    Published 2013
    “…In this paper, we develop a technology for the materials selection system using Java based expert system. The weighted-range method (WRM) was implemented to identify the range value and to scrutinise the candidate materials. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7
  8. 8

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…According to the simulation results, the proposed algorithm produces the best solution among all algorithms in the proposed cases. � 2021 Little Lion Scientific…”
    Review
  9. 9

    Hand blood vessels pattern recognition by Tan, Xuan Qing

    Published 2023
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  10. 10
  11. 11

    Anti-stammering algorithm with adapted multi-layer perceptron by Ali Bashar Hussein, Al-Nima, Raid Rafi Omar, Han, Tingting

    Published 2024
    “…This algorithm includes an effective feature extraction approach and an adapted classifier. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12
  13. 13

    Comparison of performances of Jaya Algorithm and Cuckoo Search algorithm using benchmark functions by Ahmed, Mashuk, Nasser, Abdullah B., Kamal Z., Zamli, Heripracoyo, Sulistyo

    Published 2022
    “…CS and JA have implemented in the same platform (Intellij IDEA Community Edition 2020.2.3) using the same language (Java). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Data mining using genetic algorithm in finance data / A. Noor Latiffah and A. B. Nordin by Latiffah, A. Noor, Nordin, A. B.

    Published 2006
    “…Data mining can discover patterns or rules from a vast volume of data. This patterns or rules may help to develop better decision-making process. …”
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Modeling of vehicle trajectory clustering based on LCSS for traffic pattern extraction by Choong, Mei Yeen, Lorita Angeline, Chin, Renee Ka Yin, Yeo, Kiam Beng, Teo, Kenneth Tze Kin

    Published 2017
    “…These behavioural manoeuvres are useful for interpreting the indepth study of traffic pattern in a traffic network. Hence, with the advancement of the available vehicle tracking system, vehicle trajectory dataset is selected as suitable candidate input for the traffic pattern extraction. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceedings
  17. 17

    Feature extraction: hand shape, hand position and hand trajectory path by Bilal, Sara Mohammed Osman Saleh, Akmeliawati, Rini

    Published 2011
    “…Algorithms have been developed for extracting these features after segmenting the head and the two hands. …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  18. 18

    Pattern Classification of Human Epithelial Images by Mohd Isa, Mohd Fazlie

    Published 2016
    “…First of all, image enhancement will take part in order to boost efficiency of algorithm by implementing some of the adjustment and filtering technique to increase the visibility of image. …”
    Get full text
    Get full text
    Final Year Project
  19. 19

    Solar photovoltaic system based on perturb and observe maximum power point tracking with trapezoidal rule approach under partial shading conditions by Altwallbah, Neda Mahmod Mohammad.

    Published 2022
    “…The second is to propose a hybrid MPPT algorithm based on modified P&O algorithm assisted by Extremum Seeking Control (ESC) approach, in order to maximize the extracted PV power under complex PSC. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Feature extraction for face recognition via Active Shape Model (ASM) and Active Appearance Model (AAM) by Iqtait, M., Mohamad, F.S., Mamat, M.

    Published 2018
    “…Cootes proposed a Multi Resolution Active Shape Models (ASM) algorithm, which could extract specified shape accurately and efficiently. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item