Search Results - (( java implementation learning algorithm ) OR ( data integration window algorithm ))

Refine Results
  1. 1

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Automatic detection of lineaments from LANDSAT images in United Arab Emirate (UAE) by Marghany , Maged, El Mahdi, Samy Ismail, Hashim, Mazlan

    Published 2006
    “…Integration between Laplacian, edge detection and Canny algorithms with different kernel window sizes is main component of new geomatical tool. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Improving collection of data type evidence and the integrity of evidence collected using SHA-256 hashing algorithm for web browsers by Asmawi, Aziah, Md Yasin, Sharifah, Mohd Shah, Nur Hazierah

    Published 2024
    “…The existing tools for evidence collection primarily rely on SHA-1 hashing and using older version windows and software toolkits version. Therefore, this study proposes the addition in toolkits implementation, the latest software tools version and the latest solution, an improvement proof-of-concept utilizes SHA-256 hashing algorithm to improve the collection of evidence and enhance integrity. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    An Educational Tool Aimed at Learning Metaheuristics by Kader, Md. Abdul, Jamaluddin, Jamal A., Kamal Z., Zamli

    Published 2020
    “…Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    WBEC: A web browsers evidence collection toolkit for web browsers usage in Windows 10 by Rayman, Dafiqah Mior, Asmawi, Aziah, Mohd Ariffin, Noor Afiza

    Published 2022
    “…In addition, the SHA-1 hashing algorithm was used to improve the evidence's integrity. …”
    Get full text
    Get full text
    Article
  7. 7

    A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment by Ruzita, Ahmad

    Published 2013
    “…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Digital forensic investigation reduction model (DIFReM) for Windows 10 OS by Shayau, Yazid Haruna

    Published 2018
    “…The most important part of Digital Forensic Investigation (DFI) is the examination of data – knowing the data type and nature beforehand makes this easier. …”
    Get full text
    Get full text
    Thesis
  9. 9

    MUD-WEIGHT PREDICTION FOR DEVIATED DRILLING by Yusoff, Muhamad Zakwan

    Published 2013
    “…Specifically, the objectives of this project are 1) to develop an algorithm for predicting mud weight in deviated drilling; 2) to solve the governing equation for stresses around the wellbore for deviated drilling and 3) to build an integrated tool kit for different data that are available on the field. …”
    Get full text
    Get full text
    Final Year Project
  10. 10

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12
  13. 13

    Automatic algorithm applied for calculating thermal conductivity by transient plane source method by Jia, Zhijie, Yang, Liping, Cao, Chengcheng, Li, Huidong, Luo, Caiyun, Tao, Te, Zhong, Qiu, Xu, Zijun, Chen, Zezhong

    Published 2024
    “…Additionally, the integration of the time window function max/tθ, typically utilized solely for result validation in conventional methods, further enhances the objectivity and reproducibility of the results obtained by the automatic algorithm…”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Detection and Severity Identification of control valve stiction in industrial loops using integrated partially retrained CNN-PCA frameworks by YAU, YONG SONG

    Published 2021
    “…In essence, features are extracted from segments of control valve signals or time series data accumulated via moving window and these features are subsequently used as a basis for monitoring of the behaviour of the valve with a PCA model in a standard multivariate process monitoring framework. …”
    Get full text
    Get full text
    Thesis
  16. 16

    An efficient unknown detection approach for RFID data stream management system by Siti Salwani, Yaacob, Hairulnizam, Mahdin, Wijayanto, Inung, Muhammad Aamir, -, Mohd Izham, Mohd Jaya, Nabilah Filzah, Mohd Radzuan, Al Fahim, Mubarak Ali

    Published 2025
    “…The materials and methods employed include comprehensive simulations and real-world RFID data streams to validate the algorithm's effectiveness. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  18. 18
  19. 19
  20. 20

    Ensemble learning using multi-objective optimisation for arabic handwritten words by Ghadhban, Haitham Qutaiba

    Published 2021
    “…In this thesis, new type of feature for handwriting using Segments Interpolation (SI) to find the best fitting line in each of the windows with a model for finding the best operating point window size for SI features. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis