Search Results - (( java implementation learning algorithm ) OR ( automatic identification problems algorithm ))

Refine Results
  1. 1

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Fingerprint feature extraction based discrete cosine transformation (DCT) by Chin Kim On, Paulraj M. Pandiyan, Sazali Yaacob, Azali Saudi

    Published 2009
    “…In this paper, a simple and effectiveness algorithm is proposed for fingerprint image recognition and the proposed algorithm is able to solve the problem discussed above. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceedings
  4. 4
  5. 5

    CORROSION DAMAGE ANALYSIS USING IMAGE PROCESSING by DEMPI, CHRISTIE BANGI

    Published 2018
    “…There is a need to develop a low cost automatic corrosion damage identification. This project focuses on early detection of pipelines and gas tanks corrosion in oil and gas. …”
    Get full text
    Get full text
    Final Year Project
  6. 6

    An Educational Tool Aimed at Learning Metaheuristics by Kader, Md. Abdul, Jamaluddin, Jamal A., Kamal Z., Zamli

    Published 2020
    “…Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment by Ruzita, Ahmad

    Published 2013
    “…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Advances in automatic insect classification by Hassan, Siti Noorul Asiah, Abdul Rahman, Nur Nadiah Syakira, Htike@Muhammad Yusof, Zaw Zaw, Shoon , Lei Win

    Published 2014
    “…There have been several attempts to create a method to perform insect identification accurately. Great knowledge and experience on entomology are required for accurate insect identification. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Simulated real-time controller for tuning algorithm using modified hill climbing approach by Ahmed, Ahmed Abdulelah

    Published 2014
    “…That led to new ways to tackle old problems like model inaccuracies and inconsistencies. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Adaptive differential evolution algorithm with fitness based selection of parameters and mutation strategies / Rawaa Dawoud Hassan Al-Dabbagh by Rawaa Dawoud Hassan, Al-Dabbagh

    Published 2015
    “…Secondly, a new DE algorithm (ARDE-SPX) is introduced that automatically adapts a repository of DE strategies and parameters control schemes to avoid the problems of stagnation and make DE respond to a wide range of function characteristics at different stages of evolutionary search. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Detection and Severity Identification of control valve stiction in industrial loops using integrated partially retrained CNN-PCA frameworks by YAU, YONG SONG

    Published 2021
    “…In this thesis, an integrated framework using such partially retrained convolutional neural networks in conjunction with principal component analysis (CNN-PCA) is proposed for simultaneous control valve stiction detection and automatic identification of the severity of the problem. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14
  15. 15

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Real-time identification of an unmanned quadcopter flight dynamics using fully tuned radial basis function network by Pairan, Mohammad Fahmi

    Published 2018
    “…Recursive learning algorithms, such as Constant Trace (CT) can be implemented to solve insufficient training data and over-fitting problems by developing a new model from real-time flight data in each time step. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Automatic License Plate Recognition System for Recognizing Overlapping Characters in Malaysian License Plates by Jofri, Mohd Kholil

    Published 2017
    “…License plate is used for identification of vehicles. Automatic License Plate Recognition (ALPR) has been developed in application such as parking and toll fees, and assisting police in law enforcement. …”
    Get full text
    Get full text
    Final Year Project
  18. 18

    Fuzzy modelling using firefly algorithm for phishing detection by Noor Syahirah, Nordin, Mohd Arfian, Ismail, Mezhuyev, Vitaliy, Shahreen, Kasim, Mohd Saberi, Mohamad, Ashraf Osman, Ibrahim

    Published 2019
    “…One of the suitable methods provides the Firefly Algorithm (FA). FA is a nature-inspired algorithm that uses fireflies’ behavior to interpret data. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Vehicle Tracking using Video Cameras by Johnson, Girberth

    Published 2013
    “…However, relying on human‟s eyes is not a reliable system as the technology now allows an automatic detection system. The „Vehicles Tracking System Using Video Cameras‟ is the basic solution to those problems. …”
    Get full text
    Get full text
    Final Year Project
  20. 20

    Comparison of UAV flying height parameter for crack detection applications / Wan Nurdayini Batrisyia Wan Ghazali by Wan Ghazali, Wan Nurdayini Batrisyia

    Published 2024
    “…The objectives of this research include assessing the impact of UAV height and applying the Difference of Gaussian (DoG) Algorithms in crack identification. The goal here is to establish the level of effectiveness of the DoG algorithm in detecting cracks in images derived from orthomosaics at different heights. …”
    Get full text
    Get full text
    Student Project