Search Results - (( java implementation case algorithm ) OR ( reading patterns learning algorithm ))
Search alternatives:
- java implementation »
- implementation case »
- learning algorithm »
- patterns learning »
- case algorithm »
- reading »
-
1
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
2
-
3
Pairwise testing tools based on hill climbing algorithm (PTCA)
Published 2014“…The actual implementation of the algorithm which is in Java programming language, the program is implemented on Net Bean 7.0.1. …”
Get full text
Get full text
Undergraduates Project Papers -
4
Examination timetabling using genetic algorithm case study: KUiTTHO
Published 2005Get full text
Get full text
Thesis -
5
Java based expert system for selection of natural fibre composite materials
Published 2013“…In this paper, we develop a technology for the materials selection system using Java based expert system. The weighted-range method (WRM) was implemented to identify the range value and to scrutinise the candidate materials. …”
Get full text
Get full text
Get full text
Article -
6
-
7
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…According to the simulation results, the proposed algorithm produces the best solution among all algorithms in the proposed cases. � 2021 Little Lion Scientific…”
Review -
8
Comparison of performances of Jaya Algorithm and Cuckoo Search algorithm using benchmark functions
Published 2022“…CS and JA have implemented in the same platform (Intellij IDEA Community Edition 2020.2.3) using the same language (Java). …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Neural Network Based Pattern Recognition in Visual Inspection System for Intergrated Circuit Mark Inspection
Published 1998“…The neural networks c1assifier was very successful in classifying 1 3 different image patterns by learning from 4 training patterns. The classifier also clocked an average speed of 9.6ms which makes it feasible to implement it on the production floor. …”
Get full text
Get full text
Thesis -
10
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
11
Dyslexia handwriting detection using Convolutional Neural Network (CNN) algorithm / Sofea Najihah Mohd Zaki
Published 2024“…Dyslexia is a neurological learning situation that affects a person's ability to read, spell, write, and speak. …”
Get full text
Get full text
Thesis -
12
Acquisition of context-based word recognition by reinforcement learning using a recurrent neural network
Published 2012“…The developed learning system has a 4-layered RNN and it was trained by BPTT method based on teaching signal that was generated by Q-Learning algorithm. …”
Get full text
Get full text
Thesis -
13
Acquisition of context-based word recognition by reinforcement learning using a recurrent neural network
Published 2012“…After the real time learning, learning was successful and system manages to recognize the entire prepared patterns. …”
Get full text
Get full text
Thesis -
14
Acquisition of context-based word recognition by reinforcement learning using a recurrent neural network
Published 2012“…The developed learning system has a 4-layered RNN and it was trained by BPTT method based on teaching signal that was generated by Q-Learning algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
15
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
16
Enhancing user authentication through the implementation of the ForestPA algorithm for smart healthcare systems
Published 2025“…A model was trained via the forest penalizing attributes (ForestPA) algorithm, which can classify profiles into real or fake profiles on the basis of their behavioral patterns. …”
Get full text
Get full text
Get full text
Article -
17
Teaching and learning qur'anic Arabic utilizing adaptive and intelligent systems for collaborative learning (EDW B13-084-0969)
Published 2015“…This has given rise to a Muslim demographic segment of adult learners whose main learning goal is to recall an idiomatic translation while reading or listening to the Qur'an. …”
Get full text
Get full text
Monograph -
18
Enhancing user authentication through the implementation of the ForestPA algorithm for smart healthcare systems
Published 2025“…A model was trained via the forest penalizing attributes (ForestPA) algorithm, which can classify profiles into real or fake profiles on the basis of their behavioral patterns. …”
Get full text
Get full text
Get full text
Get full text
Article -
19
MELODY TRAINING WITH SEGMENT-BASED TILT CONTOUR FOR QURANIC TARANNUM
Published 2021“…The study provides an alternative interactive session for people who want to learn Tarannum, as well as a preliminary step toward understanding the melodic patterns for tarannum. …”
Get full text
Get full text
Article -
20
Web-based expert system for material selection of natural fiber- reinforced polymer composites
Published 2015“…In this research, first the implementation of Analytical Hierarchy Process (AHP) computational tool was explored for deciding optimum material for automotive components. …”
Get full text
Get full text
Thesis
