Search Results - (( java implementation learning algorithm ) OR ( pattern design process algorithm ))

Refine Results
  1. 1

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    An Educational Tool Aimed at Learning Metaheuristics by Kader, Md. Abdul, Jamaluddin, Jamal A., Kamal Z., Zamli

    Published 2020
    “…Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    New Fast Block Matching Algorithm Using New Hybrid Search Pattern And Strategy To Improve Motion Estimation Process In Video Coding Technique by Hamid, Nurul 'Atiqah

    Published 2016
    “…There are 6 main designs that the algorithms proposed namely the Orthogonal-Diamond Search Algorithm with Small Diamond Search Pattern (ODS-SDSP), the Orthogonal-Diamond Search Algorithm with Large Diamond Search Pattern (ODS-LDSP), the Diamond-Orthogonal Search Algorithm with Small Diamond Pattern (DOS-SDSP), the Diamond-Orthogonal Search Algorithm with Large Diamond Pattern (DOS-LDSP), the Modified Diamond-Orthogonal Search Algorithm with Small Diamond Pattern (MDOS-SDSP), and the Modified Diamond-Orthogonal Search Algorithm with Large Diamond Pattern (MDOS-LDSP). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment by Ruzita, Ahmad

    Published 2013
    “…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Hexagon pattern particle swarm optimization based block matching algorithm for motion estimation / Siti Eshah Che Osman by Che Osman, Siti Eshah

    Published 2019
    “…Due to the center biased nature of the videos, the HPSO algorithm uses an initial pattern (hexagon-shaped) to speed up the convergence of the algorithm. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Linear-PSO with binary search algorithm for DNA Motif Discovery / Hazaruddin Harun by Harun, Hazaruddin

    Published 2015
    “…Motif Discovery (MD) is the process of identifying meaningful patterns in DNA, RNA, or protein sequences. …”
    Get full text
    Get full text
    Book Section
  8. 8

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Developing triad design algorithms based on compatible factorization by Ibrahim, Haslinda, Omar, Zurni, Abdul Rahim, Rahela

    Published 2011
    “…These processes have helped us develop algorithm for triad design, the objective of this study.A new technique for triad design algorithm, known as Interval Generation Method was employed to construct TD(6n + 1) and TD(6n + 5).This method depends on analyzing the pattern of triples in the design to build starters.We begin by producing starters from Interval Generation Method as the initial block to begin with.Then the algorithm begins by cycling modular v from the initial block and finishes when the process approaches the initial block.The algorithms for TD(6n+1) and TD(6n+5) are presented in Chapter 4 and 5, respectively.As the entire study depends mainly on TD(v) algorithms, new and remarkable theorems and lemmas for TD(v) development are presented and proved.…”
    Get full text
    Get full text
    Get full text
    Monograph
  10. 10

    Design and analysis of DNA sequence alignment module using Smith-Waterman scoring patterns / Wan Abdul Qayyum Moh Salleh by Moh Salleh, Wan Abdul Qayyum

    Published 2013
    “…Synopsys tools are used for analysis the project in ASIC design. VCS for verification the design for further process in ASIC design tools are used. …”
    Get full text
    Get full text
    Student Project
  11. 11

    Design and analysis of DNA sequence alignment module using Smith-Waterman scoring pattern: article / Wan Abdul Qayyum Moh Salleh and A.K. Halim by Moh Salleh, Wan Abdul Qayyum, A.K., Halim

    Published 2013
    “…Synopsys tools are used for analysis the project in ASIC design. VCS for verification the design for further process in ASIC design tools are used. …”
    Get full text
    Get full text
    Article
  12. 12
  13. 13

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Optimizing Central Pattern Generators (CPG) Controller For One Legged Hopping Robot By Using Genetic Algorithm (GA) by Chong, Shin Horng, Azahar, Arman Hadi, Mohamed Kassim, Anuar, Zainal Abidin, Amar Faiz, Harun, Mohamad Haniff, Nor Shah, Mohd Badril, Mohd Annuar, Khalil Azha, Manap, Mustafa, Rizman, Zairi Ismael

    Published 2018
    “…This paper presents the optimization process of Central Pattern Generator (CPG) controller for one legged hopping robot by using Genetic Algorithm (GA).To control the one legged hopping robot,a CPG controller is designed and integrated with a conventional ProportionalIntegral (PI) controller.Conventionally,the CPG parameters are tuned manually.But by using this method,the parameters produced are not exactly the optimum parameters for the CPG. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Individual And Ensemble Pattern Classification Models Using Enhanced Fuzzy Min-Max Neural Networks by F. M., Mohammed

    Published 2014
    “…Pattern classification is one of the major components for the design and development of a computerized pattern recognition system. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Linear-pso with binary search algorithm for DNA motif discovery / Hazaruddin Harun by Harun, Hazaruddin

    Published 2015
    “…Motif Discovery (MD) is the process of identifying meaningful patterns in DNA, RNA, or protein sequences. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Object with symmetrical pattern recognition with dynamic size filter by Syed Mohamad Shazali, Syed Abdul Hamid, Mohd Aras, Mohd Shahrieel, Abdul Azis, Fadilah, Ali, Fara Ashikin, Anuar , Mohamed Kassim

    Published 2011
    “…This system is design for on-event processes and suitable for indoor environment applications with low time frame rate camera. …”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Efficient hardware design for palm-dorsa vein image enhancement by Jusoh@Yusoff, Suhaimi Bahisham

    Published 2018
    “…The algorithm is designed in hardware using hardware description language for hardware realization. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  20. 20

    Weighted Watson-crick automata and applications in halal authentication by Mohd Tamrin, Mohd Izzuddin, Turaev, Sherzod, Che Azemin, Mohd Zulfaezal

    Published 2016
    “…We also construct formal models for food authentication processes and develop algorithms for the identification of non halal patterns in DNA molecules. …”
    Get full text
    Get full text
    Monograph