Search Results - (( java implementation learning algorithm ) OR ( graphical estimation using algorithm ))

Refine Results
  1. 1

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Factors influencing graphical user algorithm for mobile banking user authentication: a systematic literature review by Ugochukwu, Ejike Ekeke Kingsley, Jusoh, Yusmadi Yah

    Published 2014
    “…With the increasing number of mobile users, which currently is estimated to be about 500million users by 2015 according to a study done by the Yankee Group in 2011, the main objective of this study is to review studies on mobile banking usability factors and graphical user authentication algorithms on the suitable algorithm to be adopted for mobile banking user authentication. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    An Educational Tool Aimed at Learning Metaheuristics by Kader, Md. Abdul, Jamaluddin, Jamal A., Kamal Z., Zamli

    Published 2020
    “…Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    A graphical user interface application for continuous-time identification of dynamical system by Rahmat, Mohd. Fua'ad, Omar, Rosli, Jamaluddin, Hishamuddin

    Published 2002
    “…This paper introduces a Graphical User Interface (GUI) application in system identification and parameter estimation of dynamic systems using Generalized Poisson Moment Functionals (GPMF) method based on Instrumental Variable (IV) algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment by Ruzita, Ahmad

    Published 2013
    “…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Surface Moisture Content Retrieval from Visible/Thermal Infrared Images and Field Measurements by Abdalla HASSABALLA, Abdalhaleem, MATORI , Abdul Nasir, Mohd SHAFRI, Helmi Zulhaidi

    Published 2013
    “…In this study, NOAA/AVHRR satellite was used to estimate the surface temperature and satellite estimated soil moisture content as input parameters leading to estimate the evapotranspiration over Perak Tengah & Majung regions in Malaysia. …”
    Get full text
    Get full text
    Article
  9. 9

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Indoor location estimation utilizing Wi-Fi Signals by Hashim, Nik Mohd Zarifie, Zahari, Muhammad Khairul, Ja'afar, Abd Shukur, Salleh, Azahari, Darsono, Abd Majid

    Published 2020
    “…Analysis of views called the fingerprint algorithm is used in this study. The algorithm involved two phases over an offline and the online phases of the survey. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Deep convolutional neural networks for forensic age estimation: A review by Alkaabi S., Yussof S., Al-Khateeb H., Ahmadi-Assalemi G., Epiphaniou G.

    Published 2023
    “…The article also aims to evaluate various databases and algorithms used for age estimation using facial images and dental images. � 2020, Springer Nature Switzerland AG.…”
    Book Chapter
  12. 12

    Parameter estimation of multicomponent transient signals using deconvolution and ARMA modelling techniques by Salami, Momoh Jimoh Emiyoka, Sidek, Shahrul Na'im

    Published 2003
    “…In this method of analysis the exponential signal is converted to a convolution model whose input is a train of weighted delta function that contains the signal parameters to be determined.The resolution of the estimated decay rates is poor if the conventional fast Fourier transform (FFT) algorithm is used to analyse the resulting deconvolved data. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13
  14. 14

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    DEVELOPMENT AND TESTING OF UNIVERSAL PRESSURE DROP MODELS IN PIPELINES USING ABDUCTIVE AND ARTIFICIAL NEURAL NETWORKS by AYOUB MOHAMMED, MOHAMMED ABDALLA

    Published 2011
    “…The ANN model has been developed using resilient back-propagation learning algorithm. …”
    Get full text
    Get full text
    Thesis
  17. 17

    A case study on quality of sleep and health using Bayesian networks by Hong , Choon Ong, Chiew , Seng Lee, Chye , Ching Sia

    Published 2012
    “…The network scores computation is implemented to estimate the fitting of the resulting network of each structural learning algorithm in order to choose the best-fitted network. …”
    Get full text
    Article
  18. 18

    Bayesian Network of Traffic Accidents in Malaysia by Zamzuri, Zamira Hasanah, Shabadin, Akmalia, Ishak, Siti Zaharah

    Published 2019
    “…By using Hill Climb (HC) and Tabu algorithms, the structure of the data was learnt and their relationship is estimated through the conditional probability based on the Bayes theorem. …”
    Get full text
    Get full text
    Article
  19. 19

    Improved thresholding and quantization techniques for image compression by Md Taujuddin, Nik Shahidah Afifi

    Published 2017
    “…With many modern applications use image graphics extensively, it tends to burden both the storage and transmission process. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    System Identification of XY Table ballscrew drive using parametric and non parametric frequency domain estimation via deterministic approach by Abdullah, Lokman, Jamaludin, Zamberi, Tsung Heng, Chiew, RAFAN, NUR AIDAWATY, syed mohamed, muhammad syafiq

    Published 2012
    “…In addition, comparison of estimated model transfer function obtained via non-linear least square (NLLS) and Linear least square estimator algorithm were also being addressed. …”
    Get full text
    Get full text
    Get full text
    Article