Search Results - (( java implementation learning algorithm ) OR ( framework implementation affects algorithm ))

Refine Results
  1. 1

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    An Educational Tool Aimed at Learning Metaheuristics by Kader, Md. Abdul, Jamaluddin, Jamal A., Kamal Z., Zamli

    Published 2020
    “…Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment by Ruzita, Ahmad

    Published 2013
    “…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Benchmarking Framework for Performance in Load Balancing Single System Image by S. Ahmed, Bestoun

    Published 2009
    “…There is an essential need for a benchmark framework for the Single System Image clusters due to the wide range of implementation and the need for identifying the performance and behaviour of the system. …”
    Get full text
    Get full text
    Thesis
  8. 8

    New filtering framework for web personalization search / Anitawati Mohd Lokman and Aishah Ahmad by Mohd Lokman, Anitawati, Ahmad, Aishah

    Published 2012
    “…This algorithm can be implemented in both website and search engine.…”
    Get full text
    Get full text
    Research Reports
  9. 9

    An improved diabetes risk prediction framework : An Indonesian case study by Sutanto, Daniel Hartono

    Published 2018
    “…However,there is the issue of noisy dataset detected as incomplete data and the outlier class problem that affects sampling bias.Existing frameworks were deemed difficult in identifying the critical risk factors of diabetes;some of which were considerably inaccurate and consume substantial computation time.The purpose of this study is to develop a suitable framework for predicting diabetes risks.From a complete blood test,the framework can predict and classify the output of either having diabetes risk or no diabetes risk.A Diabetes Risk Prediction Framework (DRPF) was developed from the literature review and case studies were afterwards conducted in three private hospitals in Semarang.Analyses were conducted to find a suitable component of the framework—due to lack of comparison and analysis on the combination of feature selection and classification algorithm.DRPF comprises four main sections: pre-processing,outlier detection,risk weighting,and learning. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Customised fitness function of evolutionary algorithm for optimization of car park space / Ahmad Syahir Ab. Aziz by Ab. Aziz, Ahmad Syahir

    Published 2017
    “…Genetic algorithm is chosen for the development of the prototype to prove that genetic algorithm is the best technique to implement for optimization. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Effective use of artificial intelligence by Malaysian manufacturing firms to enable sustainability 4.0 by Chong, Agnes Wen Lin

    Published 2023
    “…The purpose is to interpret the implementation of businessanalytic ultimately affects the overall performance of the organization. and creatingafeasible framework. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  12. 12

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  13. 13

    Security analysis techniques using differential relationships for block ciphers by Buja, Alya Geogiana

    Published 2018
    “…Information must be available only for authenticated and authorized users.However,flaws and weaknesses in the cryptosystem can breach the security of stored and transmitted information.A weak key in the key schedule is well-known issues which may affect several round keys have same bits in common.Besides,information leaked from the implementation also affects the security of block ciphers.Based on the flaws and leakage,the adversary is able to assess the differential relationships in block cipher using differential cryptanalysis technique. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Affect classification using genetic-optimized ensembles of fuzzy ARTMAPs by Liew, W.S., Seera, M., Loo, C.K., Lim, E.

    Published 2015
    “…Speciation was implemented using subset selection of classification data attributes, as well as using an island model genetic algorithms method. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Error concealment technique using wavelet neural network for wireless transmitted digital images by Al-Azzawi, Alaa Khamees

    Published 2012
    “…Moreover, the concealment includes patches for both smooth and nonsmooth areas. This framework is implemented in three key steps. The first step is devoted to detecting invisible patches. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Semi-supervised learning for feature selection and classification of data / Ganesh Krishnasamy by Ganesh , Krishnasamy

    Published 2019
    “…The experimental results show that the proposed feature selection framework performed better when compared to other state-of-the-art feature selection algorithms. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18
  19. 19
  20. 20

    Railway shortest path planner application using ant colony optimization algorithm / Muhammad Hassan Firdaus Ruslan by Ruslan, Muhammad Hassan Firdaus

    Published 2017
    “…The research methodology for this project consists of five phases which are, preliminary study, data collection, system design and implementation and result analysis. Project finding are based on the Railway Shortest Path Planner (RSPP) application framework that consists of input module, output module and process module. …”
    Get full text
    Get full text
    Thesis