Search Results - (( java implementation learning algorithm ) OR ( parameter data connection algorithm ))

Refine Results
  1. 1

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    An Educational Tool Aimed at Learning Metaheuristics by Kader, Md. Abdul, Jamaluddin, Jamal A., Kamal Z., Zamli

    Published 2020
    “…Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment by Ruzita, Ahmad

    Published 2013
    “…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6
  7. 7

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Dynamic user preference parameters selection and energy consumption optimization for smart homes using deep extreme learning machine and bat algorithm by Shah, Abdul Salam, Mohamad Nasir, Haidawati, Fayaz, Muhammad, Lajis, Adidah, Ullah, Israr, Shah, Asadullah

    Published 2020
    “…In this paper, the Alpha Beta filter has been used to predict the indoor Temperature, illumination, and air quality and remove noise from the data. We applied a deep extreme learning machine approach to predict the user parameters. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Enhanced Handover Algorithm for Quality of Service Maintenance in an Extended Service Set Wi-Fi Network by Derrick Qin Sheng, Wong

    Published 2025
    “…For the enhanced roaming algorithm, two network parameters were considered: current associated stations and signal strength to the access point. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    An online density-based clustering algorithm for data stream based on local optimal radius and cluster pruning by Islam, Md Kamrul

    Published 2019
    “…BOCEDS clusters the data stream in a single stage. The algorithm summarizes the data from data stream in micro-clusters. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Faulty sensor detection using data correlation of multivariant sensor reading in smart agriculture with IOT by Malik, Ahmed Dhahir

    Published 2019
    “…This would allow the system to be more efficient and more reliable in detecting and monitoring the system’s parameters such as the state of sensors. The accuracy of the algorithm for data correlation may be changing depending on the application that wants to detect the faulty sensor in the system and according to how many data that income to the microcontroller per minute and how many data should take to calculate the correlation coefficient. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    Performance evaluation of corner effect in UMTS / Nurzaliza Ghazali by Ghazali, Nurzaliza

    Published 2009
    “…In cellular network such as UMTS, corner effect is one of the problem that effected the performance evaluation of handover algorithms. Handover is one of the key functionalities which tries to keep a user equipment (UE) connected to the best base station (Node B). …”
    Get full text
    Get full text
    Thesis
  17. 17

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  18. 18

    Delay and energy-aware routing for efficient data collection in wireless sensor networks / Ihsan Ali by Ihsan , Ali

    Published 2024
    “…To address relay node selection and data scheduling issues, Energy-Efficient Scheduling (EES) and Energy-Efficient Un-Scheduling (EEUS) methods have been introduced using the Improved Discrete Bat Algorithm (IDBA) along with the Adaptive Warshal Floyd algorithm (AWF). …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Fuzzy modelling using firefly algorithm for phishing detection by Noor Syahirah, Nordin, Mohd Arfian, Ismail, Mezhuyev, Vitaliy, Shahreen, Kasim, Mohd Saberi, Mohamad, Ashraf Osman, Ibrahim

    Published 2019
    “…One of the suitable methods provides the Firefly Algorithm (FA). FA is a nature-inspired algorithm that uses fireflies’ behavior to interpret data. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Spectrum aware clustering algorithm based on fuzzy logic for sensor based monitoring application / Noorhayati Mohamed Noor …[et al.] by Mohamed Noor, Noorhayati, Md Din, Norashidah, Kasiran, Zolidah, Khalid, Nor Azimah, Abdullah, Shapina

    Published 2020
    “…The cluster formation is based on the relative channel availability between the cluster member (CM) and CH to ensure stable cluster connectivity from link failure. To evaluate the proposed clustering algorithm, the performance of sensor networks is compared with CogLEACH, LEACH and CHEF routing protocols. …”
    Get full text
    Get full text
    Get full text
    Article