Search Results - (( java implementation learning algorithm ) OR ( changes data detection algorithm ))

Refine Results
  1. 1

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    The multiple outliers detection for circular univariate data using different agglomerative clustering algorithms by Nur Syahirah, Zulkipli, Siti Zanariah, Satari, Wan Nur Syahidah, Wan Yusoff

    Published 2024
    “…It has been found that SL-Chang, CL-Chang and AL-Chang algorithms work the best in detecting outliers with low masking and swamping effect when sample size is small for any percentage of outliers and concentration parameter. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    An Educational Tool Aimed at Learning Metaheuristics by Kader, Md. Abdul, Jamaluddin, Jamal A., Kamal Z., Zamli

    Published 2020
    “…Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Utilization of canny and velocity bunching algorithms for modelling shoreline change by Marghany, Maged, Hashim, Mazlan

    Published 2006
    “…This paper introduces new method for simulating shoreline change from multi-SAR data. Edge detection algorithm such as Canny algorithm is implemented to identify shoreline. …”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6
  7. 7

    A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment by Ruzita, Ahmad

    Published 2013
    “…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Early detection for server availability in University Malaya data center / Mohd Azizi Osman by Osman, Mohd Azizi

    Published 2016
    “…The current system has been used manually to monitor the servers and many changes need to fulfill current requirement. The objective of the system is to design the detection algorithm for server availability, to develop the detection algorithm for server availability and to test the detection algorithm form server availability. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Artificial immune system based on real valued negative selection algorithms for anomaly detection by Khairi, Rihab Salah

    Published 2015
    “…This shows that the Negative Selection Algorithms are equipped with the capabilities of detecting changes in data, thus appropriate for anomaly detection. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Abnormal data detection model based on autoencoder and random forest algorithm: camera sensor data in autonomous driving systems by Shengwen, Geng, Osman, Mohd Hafeez

    Published 2025
    “…This project develops an AI-based anomaly detection system. In the field of autonomous driving, abnormal data will directly affect the safety of autonomous driving systems, especially in terms of abnormal camera sensor data. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Improvement real-time detection of moving vehicle in a dynamic scene using shadow removal method / Khairul Azman Ahmad, Mohd Halim Mohd Noor,Mohamad Adha Mohamad Idin by Ahmad, Khairul Azman, Mohd Noor, Mohd Halim, Mohamad Idin, Mohamad Adha

    Published 2011
    “…There are four major steps in a background subtraction algorithm, which are pre-processing, background modeling, foreground detection, and data validation. …”
    Get full text
    Get full text
    Research Reports
  13. 13
  14. 14

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    Collision avoidance algorithm design for UAV base on parametric theorem and circle overlapping method / Nur Fadzilah Mohamad Radzi by Nur Fadzilah, Mohamad Radzi

    Published 2013
    “…Finally, the collision avoidance algorithm is verified through MATLAB software. Various cases are tested to demonstrate the robustness of both collision detection and avoidance algorithms.…”
    Get full text
    Get full text
    Thesis
  17. 17

    An online density-based clustering algorithm for data stream based on local optimal radius and cluster pruning by Islam, Md Kamrul

    Published 2019
    “…The experimental result shows BOCEDS is able to generate new clusters and remove outdated clusters with time as data stream contents change. The experiment on noisy data stream shows that BOCEDS algorithm can detect noise with an accuracy of approximately 100%. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Image Processing Of Digital Mammograms For Breast Cancer Detection And Classification by Mohd Nizom, Ahmad Nabil

    Published 2018
    “…The accuracy of the algorithm developed in detecting tumour is 94.38% showing that it is relevant for use by radiologists. …”
    Get full text
    Get full text
    Monograph
  19. 19

    Temporal video segmentation using squared form of Krawtchouk-Tchebichef moments by Abdulhussain, Sadiq H.

    Published 2018
    “…In addition, the wipe and dissolve transitions are detected using the change-point detection technique, SVM model, and scale invariant feature transform (SIFT). …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Bayesian Network Classifiers for Damage Detection in Engineering Material by Mohamed Addin, Addin Osman

    Published 2007
    “…The methodology used in the thesis to implement the Bayesian network for the damage detection provides a preliminary analysis used in proposing a novel fea- ture extraction algorithm (f-FFE: the f-folds feature extraction algorithm). …”
    Get full text
    Get full text
    Thesis