Search Results - (( java implementation learning algorithm ) OR ( knowledge modelling normalization algorithm ))

Refine Results
  1. 1

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    An Educational Tool Aimed at Learning Metaheuristics by Kader, Md. Abdul, Jamaluddin, Jamal A., Kamal Z., Zamli

    Published 2020
    “…Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment by Ruzita, Ahmad

    Published 2013
    “…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Classification of Cardiac Disorders Based on Electrocardiogram Data with Fuzzy Cognitive Map (FCM) Algorithm Approach by Sumiati, ., Hoga, Saragih, T.K.A, Rahman, Viktor Vekky, Ronald Repi, Agung, Triayudi

    Published 2021
    “…FCM itself is a form of knowledge representation, design elements, and algorithm de�scriptions that are included in the FCM Expert software. …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    An improved recommender system based on normalization of matrix factorization and collaborative filtering algorithms by Zahid, Aafaq

    Published 2015
    “…It is concluded that the resultant hybrid techniques can perform well if the variables provided to normalization by neighborhood model (MF and CF) do not have big differences in order for the hybrid normalization model to outperform every algorithm in comparison.…”
    Get full text
    Get full text
    Thesis
  8. 8

    Eye Diagram Modeling Of High-Speed Channels Using Artificial Neural Networks With An Improved Adaptive Sampling Algorithm by Goay, Chan Hong

    Published 2019
    “…This work proposes an improvement to the original adaptive sampling algorithm and uses it as the sampling method for eye diagram modeling. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Electroencephalography Simulation Hardware for Realistic Seizure, Preseizure and Normal Mode Signal Generation by Mohamed, Shakir, Qidwai, Uvais, Malik, Aamir Saeed, Kamel , Nidal

    Published 2015
    “…With controlled data types, healthy/normal, seizure and pre-seizure classes, tuning of algorithms for detection and classification applications can be attained. …”
    Get full text
    Get full text
    Article
  10. 10

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Research on the construction of an efficient and lightweight online detection method for tiny surface defects through model compression and knowledge distillation by Chen, Qipeng, Xiong, Qiaoqiao, Huang, Haisong, Tang, Saihong, Liu, Zhenghong

    Published 2024
    “…Channel pruning and layer pruning are applied to the sparse model, and post-processing methods using knowledge distillation are used to effectively reduce the model size and forward inference time while maintaining model accuracy. …”
    Get full text
    Get full text
    Article
  12. 12

    EEG Simulation Hardware for Realistic Seizure, Preseizure and Normal Mode Signal Generation by Shakir, Mohamed, Qidwai, Uvais, Malik, Aamir Saeed, Kamel, Nidal

    Published 2015
    “…With controlled data types, healthy/normal, seizure and pre-seizure classes, tuning of algorithms for detection and classification applications can be attained. …”
    Get full text
    Get full text
    Citation Index Journal
  13. 13

    Cognitive knowledge-based model for adaptive feedback: A case in physics / Andrew Thomas Bimba by Andrew Thomas, Bimba

    Published 2019
    “…The model uses the Cognitive Knowledge Base (CKB) to represent knowledge as a formal concept based on an Object-Attribute-Relation (OAR) model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  15. 15

    An initial state of design and development of intelligent knowledge discovery system for stock exchange database by Che Mat @ Mohd Shukor, Zamzarina, Khokhar, Rashid Hafeez, Md Sap, Mohd Noor

    Published 2004
    “…Generally our clustering algorithm consists of two steps including training and running steps.The training step is conducted for generating the neural network knowledge based on clustering.In running step, neural network knowledge based is used for supporting the Module in order to generate learned complete data, transformed data and interesting clusters that will help to generate interesting rules.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Frequent Lexicographic Algorithm for Mining Association Rules by Mustapha, Norwati

    Published 2005
    “…The implementation of an adopted theory of representative model proved that this model is more concise than the other two models. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Optimization of neural network architecture using genetic algorithm for load forecasting by Islam, B.U., Baharudin, Z., Raza, M.Q., Nallagownden, P.

    Published 2014
    “…The network structures are normally selected on the basis of the developer's prior knowledge or hit and trial approach is used for this purpose. …”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18
  19. 19

    Unsupervised Anomaly Detection with Unlabeled Data Using Clustering by Chimphlee, Witcha, Abdullah, Abdul Hanan, Md. Sap, Mohd. Noor

    Published 2005
    “…Traditional anomaly detection algorithms require a set of purely normal data from which they train their model. …”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Agent-based extraction algorithm for computational problem solving by Rajabi, Maryam

    Published 2015
    “…Four agents have been proposed as an agent based model for CPS, which are User_Agent, PAC_Agent, IPO_Agent and Algorithm_Agent. …”
    Get full text
    Get full text
    Thesis