Search Results - (( java implementation learning algorithm ) OR ( causing process based algorithm ))

Refine Results
  1. 1

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    An Educational Tool Aimed at Learning Metaheuristics by Kader, Md. Abdul, Jamaluddin, Jamal A., Kamal Z., Zamli

    Published 2020
    “…Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment by Ruzita, Ahmad

    Published 2013
    “…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Distance vector-hop range-free location algorithm for wireless sensor network by Zazali, Azyyati Adiah

    Published 2015
    “…This has caused the tasks for each sensor node to be permanently fixed, thus causing the overall process of the localization algorithm to be complex. …”
    Get full text
    Get full text
    Thesis
  8. 8

    A refined differential evolution algorithm for improving the performance of optimization process by A. R., Yusoff, Nafrizuan, Mat Yahya

    Published 2011
    “…However, the population trapped in local optimality and premature convergence to cause in DE algorithm have cause poor performance during optimization process. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Rain streak removal using emboss and spatial-temporal depth filtering technique in video keyframes by Shariah, Sawsan Kamel

    Published 2012
    “…The filter algorithm is based on an enhanced harmonic mean filter algorithm. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  11. 11

    Hazard identification on fractionation column using rule based expert system by Mohd Yunus, Mohd Yusri, Ali, Mohamad Wijayanuddin

    Published 2001
    “…The link between Hazard and Operability Study result documentation with data base of process operation is important, in order to analyse the causes and consequences of the whole process deviation on fractionation column. …”
    Get full text
    Get full text
    Article
  12. 12

    Coarse Resolution Defect Localization Algorithm For An Automated Visual Pcb Inspection by Ibrahim, Zuwairie, Al-Attas, Syed Abdul Rahman, Aspar, Zulfakar

    Published 2002
    “…Printing process, which is done before the etching process, caused most of the destructive defects found on the PCB. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Hexagon pattern particle swarm optimization based block matching algorithm for motion estimation / Siti Eshah Che Osman by Che Osman, Siti Eshah

    Published 2019
    “…This study is divided into several phases including preliminary study, experimental design, algorithm enhancement and result analysis. Initialization position of the particles is the first process in PSO and basically all particles are initialized at random position that may cause high computation risk. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Adaptable algorithms for performance optimization of dynamic batch manufacturing processes by Teo, Kenneth Tze Kin

    Published 2018
    “…Central to precision manufacturing is artificial intelligence as this thesis presents the performance characteristics of tuning-based, rule-based, learning-based and evolutionary-based algorithms. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    A hybrid kidney algorithm strategy for combinatorial interaction testing problem by Ameen Ali, Mohammed Ba Homaid

    Published 2022
    “…In addition, the hybrid metaheuristic-based CIT strategies require more execution time than their own original algorithm-based strategies. …”
    Get full text
    Get full text
    Thesis
  16. 16

    An online density-based clustering algorithm for data stream based on local optimal radius and cluster pruning by Islam, Md Kamrul

    Published 2019
    “…In this study, a fully online density-based clustering algorithm called Buffer-based Online Clustering for Evolving Data Stream (BOCEDS) is presented. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Fire Detection Algorithm using Image Processing Techniques by Poobalan, Kumarguru, Liew, Siau-Chuin

    Published 2015
    “…In this paper we proposed a fire detection algorithm based on image processing techniques which is compatible in surveillance devices like CCTV, wireless camera to UAVs. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18
  19. 19

    Using genetic algorithms as image watermarking performance optimizer / Zuhaili Zahid by Zahid, Zuhaili

    Published 2008
    “…As a result, these errors will produce less accurate results during the process of extraction to the original watermark. Thus, this project will introduce a genetic-algorithms-based technique to overcome the rounding error problem. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Analysis of anti-multipath performance based on traditional acquisition algorithm of boc signal by Ji, Yuanfa, Song, Sisi, Sun, Xiyan, Kamarul Hawari, Ghazali, Zhao, Songke

    Published 2022
    “…In order to analyze the degree of interference caused by multipath errors in the signal acquisition process, and compare the anti-multipath performance advantages of the acquisition algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item