Search Results - (( java implementation learning algorithm ) OR ( pattern integration types algorithm ))
Search alternatives:
- implementation learning »
- java implementation »
- pattern integration »
- learning algorithm »
- integration types »
- types algorithm »
-
1
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
2
An Educational Tool Aimed at Learning Metaheuristics
Published 2020“…Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
Get full text
Get full text
Get full text
Thesis -
4
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
Get full text
Get full text
Get full text
Thesis -
5
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
6
Development of automated neighborhood pattern sensitive faults syndrome generator for static random access memory
Published 2011“…Three types of March algorithms which are March 17N, March 12N and MarchPS 23N are selected to validate the tool in term of their compatibility for NPSF detection and diagnosis.Suitable data background is identified and a test procedure is developed for each algorithm. …”
Get full text
Get full text
Thesis -
7
Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak
Published 2019“…The second stage is detecting jammers by integrating both lower layers by developing Integrated Combined Layer Algorithm (ICLA). …”
Get full text
Get full text
Thesis -
8
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
9
Fsm-Based Enhanced March C- Algorithm For Memory Built-In Self-Test
Published 2017“…To increase the fault coverage of the MARCH C- algorithm on that two fault types, some enhancements were needed to make on the algorithm. …”
Get full text
Get full text
Thesis -
10
Development of behavior-based reactive navigation system for mobile robot
Published 2013“…The repeatability tests shown that the developed navigation algorithm able the robot to reach the target with the similar navigation path pattern outcome in each simulation tests. …”
Get full text
Get full text
Thesis -
11
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
12
Setting up a new Radiology Center Technology for improvement : Data mining (Image Mining Technique)
Published 2016“…Data mining is the process of mining the hidden patterns from the huge data. Data mining scans a huge volume of data to find out the patterns and correlations among the patterns. …”
Get full text
Get full text
Monograph -
13
Workload utilization dissemination on grid resources for simulation environment
Published 2013“…Among these factors are the manipulation of computer RI's, type of workload information with method of use, the workload dissemination direction along with implementation method and using certain algorithm to come out with new integrated scheduling with load balancing capability. …”
Get full text
Get full text
Conference or Workshop Item -
14
Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform
Published 2009Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Performance of Levenberg-Marquardt neural network algorithm in power quality disturbances classification / Adibah I’zzah Mohamad Kasim
Published 2025“…The classification process incorporated Root Mean Square (RMS) analysis for feature extraction and multilayer perceptron (MLP) neural networks for pattern recognition. Results demonstrated that the LM algorithm outperformed Bayesian Regularization (BR) and Scaled Conjugate Gradient (SCG) methods in terms of accuracy, convergence speed, and computational efficiency, achieving near-perfect regression values and minimal mean square error for most PQD types. …”
Get full text
Get full text
Thesis -
16
Analysis of Traffic Accident Patterns Using Association Rule Mining
Published 2024“…The application of the apriori algorithm facilitated the identification of frequent itemsets and rules that reveal patterns across accident variables, such as road conditions, road functions, accident types, weather conditions, and victim statuses. …”
Get full text
Get full text
Get full text
Get full text
Article -
17
Binary whale optimization algorithm with logarithmic decreasing time-varying modified sigmoid transfer function for descriptor selection problem
Published 2023Get full text
Get full text
Get full text
Conference or Workshop Item -
18
Hybrid weight deep belief network algorithm for anomaly-based intrusion detection system
Published 2022“…In future, the HW-DBN algorithm can be proposed as an integrated deep Learning for the classification performance of attack detection models.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
19
-
20
Analyzing UiTMCTKKT vehicle utilization and travel pattern using predictive analytics
Published 2025“…Results from the experiments showed that cars and buses were the most frequently used vehicle types, particularly during lecture days and the month of October. …”
Get full text
Get full text
Student Project
