Search Results - (( java implementation case algorithm ) OR ( using content machine algorithm ))

Refine Results
  1. 1

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Pairwise testing tools based on hill climbing algorithm (PTCA) by Lim, Seng Kee

    Published 2014
    “…The actual implementation of the algorithm which is in Java programming language, the program is implemented on Net Bean 7.0.1. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  4. 4
  5. 5

    Java based expert system for selection of natural fibre composite materials by Ahmed Ali, Basheer A., Salit, Mohd Sapuan, Zainudin, Edi Syams, Othman, Mohamed

    Published 2013
    “…In this paper, we develop a technology for the materials selection system using Java based expert system. The weighted-range method (WRM) was implemented to identify the range value and to scrutinise the candidate materials. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6
  7. 7

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…According to the simulation results, the proposed algorithm produces the best solution among all algorithms in the proposed cases. � 2021 Little Lion Scientific…”
    Review
  8. 8

    Comparison of performances of Jaya Algorithm and Cuckoo Search algorithm using benchmark functions by Ahmed, Mashuk, Nasser, Abdullah B., Kamal Z., Zamli, Heripracoyo, Sulistyo

    Published 2022
    “…CS and JA have implemented in the same platform (Intellij IDEA Community Edition 2020.2.3) using the same language (Java). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10
  11. 11

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Music Recommender System Using Machine Learning Content-Based Filtering Technique by Foong, Kin Hong

    Published 2022
    “…The objective of this project is to develop a music recommendation system using one of the Machine Learning techniques which is content-based filtering technique. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  13. 13
  14. 14

    DNA enhancer prediction using machine learning techniques with novel feature representation by Fong, Pui Kwan

    Published 2016
    “…Current computational enhancer prediction tools are centred at Support Vector Machine (SVM) utilizing sequence content feature—the k-mer. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Bot detection using machine learning algorithms on social media platforms by Gannarapu, Sainath, Dawoud, Ahmed, Ali, Rasha S., Alwan, Ali Amer

    Published 2021
    “…Also, It will improve the level of privacy and authenticity of these platforms and related users. The research uses the bot detection technique based on machine learning algorithms. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  16. 16

    Using Machine Learning Algorithms to Estimate the Compressive Property of High Strength Fiber Reinforced Concrete by Dai, L., Wu, X., Zhou, M., Ahmad, W., Ali, M., Sabri, M.M.S., Salmi, A., Ewais, D.Y.Z.

    Published 2022
    “…The considered parameters were cement content, fly ash content, slag content, silica fume content, nano-silica content, limestone powder content, sand content, coarse aggregate content, maximum aggregate size, water content, super-plasticizer content, steel fiber content, steel fiber diameter, steel fiber length, and curing time. …”
    Get full text
    Get full text
    Article
  17. 17

    Extreme learning machine classification of file clusters for evaluating content-based feature vectors by Ali, Rabei Raad, Mohamad, Kamaruddin Malik, Jamel, Sapiee, Ahmad Khalid, Shamsul Kamal

    Published 2018
    “…Consequently, an Extreme Learning Machine (ELM) neural network algorithm is used to evaluate the performance of the three methods in which it classifies the class label of the feature vectors to JPEG and Non-JPEG images for files in different file formats. …”
    Get full text
    Article
  18. 18
  19. 19

    Evaluation of rehearsal effects of multimedia content based on EEG using machine learning algorithms by Mazher, M., Aziz, A.A., Malik, A.S.

    Published 2017
    “…This paper will present the rehearsal effects based on electroencephalography (EEG) recorded data for multimedia contents. Three frequency based features are used to discriminate the three learning states mentioned as L1, L2 and L3 using machine learning algorithms. …”
    Get full text
    Get full text
    Article
  20. 20

    Computer algorithm for automated detection of intramedullary rod hole position and orientation / Ahmad Zulhilmi Mohd Ziyadi by Mohd Ziyadi, Ahmad Zulhilmi

    Published 2014
    “…The biggest and hardest is the system must able to recognize an X-ray image and all the relevant content inside it. Therefore to close the gap between manual and automatic, automatic image recognition system using machine vision algorithm must be developed. …”
    Get full text
    Get full text
    Thesis