Search Results - (( java implementation learning algorithm ) OR ( data location method algorithm ))

Refine Results
  1. 1

    Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform by Alias, Norma, Satam, Noriza, Abd. Ghaffar, Zarith Safiza, Darwis, Roziha, Hamzah, Norhafiza, Islam, Md. Rajibul

    Published 2009
    “…This paper proposed the NAGE method as a straight forward transformation from sequential to parallel algorithm using domain decomposition and splitting strategies. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    An Educational Tool Aimed at Learning Metaheuristics by Kader, Md. Abdul, Jamaluddin, Jamal A., Kamal Z., Zamli

    Published 2020
    “…Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment by Ruzita, Ahmad

    Published 2013
    “…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Three phase fault algorithm in distribution system by using database approach and impedance based method by Shamsudin, N.H., Latiff, A.A., Abas, N., Mokhlis, Hazlie, Awalin, L.J.

    Published 2012
    “…A three phase fault location algorithm using database and impedance based method is utilized in distribution system to locate fault which may occur in any possible fault sections and to optimize the switching operations to reduce the outage time affected by fault. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9
  10. 10

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Particle filter approach for tracking indoor user location using IEEE 802.11 signals by Mantoro, Teddy, Ayu, Media Anugerah, Raman, Shakiratul Husna, Latiff , N. H. M.

    Published 2011
    “…The paper discussed the comparison between the true location and the estimated location based on two types of signals data: normal data and noise data. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Particle filter approach for estimating indoor mobile user location using IEEE 802.11 signals (F1090) by Mantoro, Teddy, Ayu, Media Anugerah, Raman, Shakiratul Husna, Md. Latiff , Nurul Hidayati

    Published 2011
    “…The paper discussed the comparison between the true location and the estimated location based on two types of signals data: normal data and noise data. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  13. 13

    Data clustering using the bees algorithm by Pham, D.T, Otri, S., Afify, A., Mahmuddin, Massudi, Al-Jabbouli, H.

    Published 2007
    “…The authors’ team have developed a new population based search algorithm called the Bees Algorithm that is capable of locating near optimal solutions efficiently. …”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14
  15. 15

    Experimental studies on impact damage location in composite aerospace structures using genetic algorithms and neural networks by Mahzan, Shahruddin, J. Staszewski, Wieslaw, Worden, Keith

    Published 2010
    “…This paper compares two advanced signal processing methods for impact location in composite aircraft structures. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Smart energy meter with adaptive communication data transfer algorithm for electrical energy monitoring by Ab Halim, Haizum Hanim

    Published 2021
    “…In a conclusion, SEM prototype and adaptive communication data transfer algorithm with a combination of the three communication will be another method to solve a single communication problem of SM and suitable in residential location that offered the proposed communication infrastructure.…”
    Get full text
    Get full text
    Thesis
  17. 17

    Development of bi-objective optimization model for supply chain network design using data envelopment analysis by Rahimi, Iman

    Published 2017
    “…Therefore facility location decision in the supply chain can be performed simultaneously with data envelopment analysis (DEA) efficiency measurement. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  19. 19

    Evaluation of lightning location and lightning current wave shape using measured lightning magnetic fields at two stations by Izadi, Mahdi, Ab Kadir, Mohd Zainal Abidin, Hajikhani, Maryam, Gomes, Chandima

    Published 2016
    “…The proposed method can be helpful for creating lightning location and lightning current data banks as it can estimate the full shape of the current as opposed to the usual methods used previously.…”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20