Search Results - (( java implementation learning algorithm ) OR ( knowledge using minimum algorithm ))

Refine Results
  1. 1

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    An Educational Tool Aimed at Learning Metaheuristics by Kader, Md. Abdul, Jamaluddin, Jamal A., Kamal Z., Zamli

    Published 2020
    “…Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment by Ruzita, Ahmad

    Published 2013
    “…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Optimizing boarding school schedule using graph coloring: case study of Sekolah Menengah Sultan Abdul Halim / Nur Farhana Mohd Asri by Mohd Asri, Nur Farhana

    Published 2022
    “…Greedy Algorithm is used to solve the Vertex Coloring approach meanwhile Graph Coloring Algorithm is used to solve the Edge Coloring approach. …”
    Get full text
    Get full text
    Research Reports
  7. 7

    Optimizing boarding school schedule using graph colouring : case study of Sekolah Menengah Sultan Abdul Halim / Nur Farhana Mohd Asri by Mohd Asri, Nur Farhana

    Published 2021
    “…Greedy Algorithm is used to solve the Vertex Coloring approach meanwhile Graph Coloring Algorithm is used to solve the Edge Coloring approach. …”
    Get full text
    Get full text
    Student Project
  8. 8

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
    Get full text
    Get full text
    Thesis
  9. 9

    The implementation of z-numbers in fuzzy clustering algorithm for wellness of chronic kidney disease patients by N. J., Mohd Jamal, Ku Muhammad Naim, Ku Khalif, Mohd Sham, Mohamad

    Published 2019
    “…Consequently, the implementation of z-numbers in fuzzy clustering algorithm is taken into consideration, where it has more authority to describe the knowledge of human being and extensively used in uncertain information development. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  11. 11

    Twofold Integer Programming Model for Improving Rough Set Classification Accuracy in Data Mining. by Saeed, Walid

    Published 2005
    “…The extraction of minimum rules operation is conducted after the default rules have been generated in order to obtain the most useful discovered rules. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    The compact genetic algorithm for likelihood estimator of first order moving average model by Al-Dabbagh, R.D., Baba, M.S., Mekhilef, Saad, Kinsheel, A.

    Published 2012
    “…Recently Genetic Algorithms (GAs) have frequently been used for optimizing the solution of estimation problems. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Evaluation of MLP-ANN Training Algorithms for Modeling Soil Pore-Water Pressure Responses to Rainfall by Mustafa, M.R., Rezaur, R.B., Saiedi, Saied, Rahardjo, H., Isa, M.H.

    Published 2013
    “…It was found that all the training algorithms could be used in the prediction of pore-water pressures. …”
    Get full text
    Get full text
    Citation Index Journal
  15. 15

    An efficient algorithm to discover large and frequent itemset in high dimensional data by Zulkurnain, Nurul Fariza

    Published 2019
    “…Both algorithms apply a minimum cardinality threshold to limit the search space and a closure computation method that does not require storage of previously discovered itemsets for duplicates checking. …”
    Get full text
    Get full text
    Monograph
  16. 16

    Development of a Mobile Robot Local Navigation System Based on Fuzzy-Logic Control and Actual Virtual Target Switching by Esmaeili Motlagh, Omid Reza

    Published 2006
    “…Robot behaviors consist of obstacle avoidance, target seeking, speed control, barrier following and local minimum avoidance. While the fuzzy logic body of the algorithm performs the main tasks of obstacle avoidance, target seeking, and speed adjustment, an actual-virtual target switch strategy integrated with the fuzzy logic algorithm enables the robot to show wall following behavior when needed. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Identification model for hearing loss symptoms using machine learning techniques by Nasiru Garba Noma

    Published 2014
    “…In order to find, the correlation that exist between the hearing thresholds and symptoms of hearing loss, FP-Growth and association rule algorithms were first used to experiment with a small sample and large sample datasets. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    DSC766: Text Analytics / College of Computing, Informatics and Mathematics by UiTM, College of Computing, Informatics and Mathematics

    Published 2020
    “…This course will cover the major techniques for mining and analysing unstructured text data to discover interesting patterns, extract useful knowledge, and support decision making, with an emphasis on statistical approaches that can be generally applied to arbitrary text data in any natural language with no or minimum human effort. …”
    Get full text
    Get full text
    Get full text
    Teaching Resource
  19. 19

    Identifying Relationship between Hearing loss Symptoms and Pure-tone Audiometry Thresholds with FP-Growth Algorithm by G. Noma, Nasir, Mohd Khanapi, Abd Ghani, Mohamad Khir , Abdullah

    Published 2013
    “…Interesting relationships were discovered and the results were compared to earlier findings using the same method on a sample datasets of 50 hearing loss patients with 0.1 as the minimum support and 0.7 confidence thresholdsfor the association rule mining. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Twisted pair cable fault diagnosis via random forest machine learning by Ghazali, N. B., Seman, F. C., Isa, K., Ramli, K. N., Z. Abidin, Z., Mustam, S. M., Haek, Haek, Z. Abidin, A. N., Asrokin, A.

    Published 2022
    “…Currently, most of the telecommunication providers monitor the network performance degradation hence troubleshoot the present of the fault by using commercial test gear on-site, which may be resolved using data analytics and machine learning algorithm. …”
    Get full text
    Get full text
    Get full text
    Article