Search Results - (( java implementation learning algorithm ) OR ( joint coding using algorithm ))

Refine Results
  1. 1
  2. 2

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Development of Finite Element Code for Non-Linear Analysis of Interlocking Mortarless Masonry System by Ahmed Al- Wathaf, Ahmed Hasan

    Published 2006
    “…The developed experimental setups used in this study successfully revealed the important features of the interlocking mortarless joint. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Development of learning algorithm of passive joint for 3R under-actuated robot / Mohd Amiruddin Fikri Yaakob by Yaakob, Mohd Amiruddin Fikri

    Published 2015
    “…The approach embedded Artificial Neural Network (ANN) algorithm and SIMULINK block diagram. Experiments were conducted to predict an algorithm on position angle measurement either SIMULINK block diagram or program code method applied to three joints; Active 1, Active 2 and Passive respectively. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Fast mode decision algorithm by Maarif, Haris Al Qodri, Gunawan, Teddy Surya, Khalifa, Othman Omran

    Published 2011
    “…The default is the scalable video coding model \vhich is represented by Joint Scalable Video Model (JSVM). …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  6. 6

    Reduced rank technique for joint channel estimation and joint data detection in TD-SCDMA systems by Marzook, Ali Kamil, Ismail, Alyani, Mohd Ali, Borhanuddin, Sali, Aduwati, Khalaf, Mohannad H., Khatun, Sabira

    Published 2013
    “…The adopted reduced rank technique is based on singular value decomposition algorithm. Equations for reduced rank-joint channel estimation (JCE) are derived and compared against traditional full rank-joint channel estimators: least square (LS) or Steiner, enhanced LS, and minimum mean square error algorithms. …”
    Get full text
    Get full text
    Article
  7. 7

    An Educational Tool Aimed at Learning Metaheuristics by Kader, Md. Abdul, Jamaluddin, Jamal A., Kamal Z., Zamli

    Published 2020
    “…Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Reduced Rank Technique for Joint Channel Estimation and Joint Data Detection in TD-SCDMA Systems by Sabira, Khatun, Ali K., Marzook, Alyani, Ismail, Aduwati, Sali, Mohannad Hamed, Khalaf, Borhan, M. Ali

    Published 2012
    “…The adopted reduced rank technique is based on singular value decomposition algorithm. Equations for reduced rank-joint channel estimation (JCE) are derived and compared against traditional full rank-joint channel estimators: least square (LS) or Steiner, enhanced LS, and minimum mean square error algorithms. …”
    Get full text
    Get full text
    Article
  10. 10

    A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment by Ruzita, Ahmad

    Published 2013
    “…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Efficient mobile video transmission based on a joint coding scheme by Azni, Mohamed, Boudjadja, Rima, Dahmani, Abdelnasser, Zennir, Mohamed Nadjib

    Published 2017
    “…In this paper, we propose a joint coding design which uses the Symbol Forward Error Correction (S-FEC) at the application layer. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Reduced-rank technique for joint channel estimation in TD-SCDMA systems. by Ismail, Alyani, Sali, Aduwati, Mohd Ali, Borhanuddin, Khatun, Sabira

    Published 2013
    “…The adopted reduced rank technique is based on singular value decomposition algorithm. Equations for reduced rank-joint channel estimation (JCE) are derived and compared against traditional full rank-joint channel estimators: least square (LS) or Steiner, enhanced LS, and minimum mean square error algorithms. …”
    Get full text
    Get full text
    Article
  13. 13

    Improved undetected error probability model for JTEC and JTEC-SQED coding schemes by Flayyih, Wameedh Nazar, Samsudin, Khairulmizam, Hashim, Shaiful Jahari, Rokhani, Fakhrul Zaman, Ismail, Yehea I.

    Published 2013
    “…This paper presents an improved mathematical model to estimate the undetected error probability of these two joint coding schemes. According to the decoding algorithm the errors are classified into patterns and their decoding result is checked for failures. …”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14
  15. 15

    Implementing Station-to-Station protocol using Multi Prime RSA Cryptosystem / Muhammad Arif Musa Abdullah by Abdullah, Muhammad Arif Musa

    Published 2023
    “…The study recommends to use another type of digital signature algorithm to be used in the proposed method. …”
    Get full text
    Get full text
    Student Project
  16. 16

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Self-configured link adaptation using channel quality indicator-modulation and coding scheme mapping with partial feedback for green long-term evolution cellular systems by Salman, Mustafa Ismael

    Published 2015
    “…Therefore, the SCLAPF algorithm, which jointly evaluates the energy-efficient scheduling and partial feedback, gives the best tradeoff between uplink and downlink performances.…”
    Get full text
    Get full text
    Thesis
  18. 18

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Finite element modelling of damage fracture and fretting fatigue by Wahab, M. Abdel, Hilmy, Irfan, Hafiz, Tauqeer, Talemi, R. Hojjati

    Published 2012
    “…Furthermore, crack propagation algorithm is programmed within FE code using the principles of Fracture Mechanics and Paris law. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  20. 20

    Design and Analysis of a Dynamic Space-Code Multiple Access with Large Area Synchronous Scheme Using the Smart Antenna System by Ng, Chee Kyun

    Published 2007
    “…The size of IFW is adaptable with the size of smart antenna beamwidth through dynamic space code (DSC) algorithm. Hence, this double signatures scheme forms a novel multiple access scheme called Dynamic Space Code Multiple Access (DSCMA) system. …”
    Get full text
    Get full text
    Thesis