Search Results - (( java implementation learning algorithm ) OR ( knowledge operating based algorithm ))

Refine Results
  1. 1

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    An Educational Tool Aimed at Learning Metaheuristics by Kader, Md. Abdul, Jamaluddin, Jamal A., Kamal Z., Zamli

    Published 2020
    “…Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment by Ruzita, Ahmad

    Published 2013
    “…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Discovering decision algorithm of distance protective relay based on rough set theory and rule quality measure by Othman, Mohamad Lutfi

    Published 2011
    “…A distance protective relay performance analysis is only feasible when the hypothesis of expected relay operation characteristics as decision rules is established as the knowledge base. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Overview of metaheuristic: classification of population and trajectory by Zainul Rashid, Zarina

    Published 2010
    “…The algorithm techniques can be characterized based on the criteria of the operation of the search process. …”
    Get full text
    Get full text
    Monograph
  8. 8

    Hazard identification on fractionation column using rule based expert system by Mohd Yunus, Mohd Yusri, Ali, Mohamad Wijayanuddin

    Published 2001
    “…A rule-based expert system has been developed in which the knowledge used to assist Hazard and Operability Study is divided into process-specific and process-general components. …”
    Get full text
    Get full text
    Article
  9. 9

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Knowledge discovery in distance relay event report: a comparative data-mining strategy of rough set theory with decision tree by Othman, Mohammad Lutfi, Aris, Ishak, Abdullah, Senan Mahmood, Ali, Md. Liakot, Othman, Mohammad Ridzal

    Published 2010
    “…A protective relay performance analysis is only feasible when the hypothesis of expected relay operation characteristics as decision rules is established as the knowledge base. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    Evolutionary Algorithms In Auction Models Of Service Procurement by Lee, Chen Wei

    Published 2019
    “…Therefore, this research proposed an implementation of genetic algorithm (GA) with knowledge based operators as an alternative to approximate the solution.…”
    Get full text
    Get full text
    Thesis
  13. 13

    Development of a modified adaptive protection scheme using machine learning technique for fault classification in renewable energy penetrated transmission line by Olufemi, Osaji Emmanuel

    Published 2020
    “…The current Adaptive Protection Scheme (APS) motivation focused on the accurate relay operation setting changes based on the prevailing grid system configuration variations. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  15. 15

    Enhanced Instantaneous Power Theory with average algorithm for indirect current controlled three-level inverter-based shunt active power filter under dynamic state conditions by Hoon, Yap, Mohd Radzi, Mohd Amran, Hassan, Mohd Khair, Mailah, Nashiren Farzilah

    Published 2016
    “…An enhanced harmonics extraction algorithm based on Instantaneous Power (PQ) Theory is proposed for indirect current controlled (ICC) three-level neutral point diode clamped (NPC) inverter-based shunt active power filter (SAPF). …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Application Of Multi-Layer Perceptron Technique To Detect And Locate The Base Of A Young Corn Plant by Morshidi, Malik Arman

    Published 2007
    “…In this research, a vision system algorithm has been developed to identify and locate base of young corn trees based upon robot vision technology, pattern recognition techniques, and knowledge-based decision theory. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Optimization Of Two-Dimensional Dual Beam Scanning System Using Genetic Algorithms by Koh, Johnny Siaw Paw

    Published 2008
    “…Also, this research involves in developing a machine-learning system and program via genetic algorithm that is capable of performing independent learning capability and optimization for scanning sequence using novel GA operators. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Ontology-based metabolic pathway prediction using saccharomyces cerevisiae data from genbank, ecocyc and kegg by Zakaria, Yuslina

    Published 2006
    “…The identification and validation of drug targets depends critically on knowledge of the metabolic pathways in which potential target molecules operate within cells. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Average concept of crossover operator in real coded genetic algorithm by Abd Rahman, Rosshairy, Ramli, Razamin

    Published 2013
    “…As the most important search operator in a Genetic Algorithm (GA) approach, many procedures have been proposed to accomplish the idea of a crossover.As a result, knowledge in crossover has incorporated special features such as statistical elements (i.e. arithmetic crossover) and natural observation (i.e. queen bee crossover) to name a few.Thus, this paper proposed a mean or average concept of crossover for finer parents to produce a new offspring in a GA based approach in an animal diet formulation problem.Experiments using real data were carried out involving GA models with average crossover and one-point crossover.Subsequently, the incorporation of power heuristics as a repair operator was investigated to find the best combination of ingredients, while removing the unwanted ones.Comparisons were made between GA models incorporating repair operator with different crossovers: average crossover and one point crossover.The results show that the performance of average crossover is comparable with that of the one point crossover.The inclusion of the repair operator provides an advantage that shows interesting solution for the tested problem.…”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Improved autonomous charging of mobile multi-robots using honeybee-inspired algorithm by Ahmad@Mohd Yusoff, Faisul Arif

    Published 2016
    “…To accomplish this aim, the optimum energy for working and foraging based on the knowledge existence was implemented. …”
    Get full text
    Get full text
    Thesis