Search Results - (( java implementation learning algorithm ) OR ( pattern learning module algorithm ))

Refine Results
  1. 1

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Neural Network Based Pattern Recognition in Visual Inspection System for Intergrated Circuit Mark Inspection by Sevamalai, Venantius Kumar

    Published 1998
    “…The neural networks c1assifier was very successful in classifying 1 3 different image patterns by learning from 4 training patterns. The classifier also clocked an average speed of 9.6ms which makes it feasible to implement it on the production floor. …”
    Get full text
    Get full text
    Thesis
  3. 3

    An Educational Tool Aimed at Learning Metaheuristics by Kader, Md. Abdul, Jamaluddin, Jamal A., Kamal Z., Zamli

    Published 2020
    “…Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment by Ruzita, Ahmad

    Published 2013
    “…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Fish Motion Trajectories Detection Algorithm Based on Spiking Neural Network (S/O: 12893) by Yusoff, Nooraini, Yusof, Yuhanis, Siraj, Fadzilah, Ahmad, Farzana Kabir

    Published 2017
    “…The spike encoding was used for feature extraction. The algorithm for this learning model adopted the reward-modulated STDP. …”
    Get full text
    Get full text
    Monograph
  7. 7
  8. 8

    An initial state of design and development of intelligent knowledge discovery system for stock exchange database by Che Mat @ Mohd Shukor, Zamzarina, Khokhar, Rashid Hafeez, Md Sap, Mohd Noor

    Published 2004
    “…We divide our problem in two modules.In first module we define Fuzzy Rule Base System to determined vague information in stock exchange databases.After normalizing massive amount of data we will apply our proposed approach, Mining Frequent Patterns with Neural Networks.Future prediction (e.g., political condition, corporation factors, macro economy factors, and psychological factors of investors) perform an important rule in Stock Exchange, so in our prediction model we will be able to predict results more precisely.In second module we will generate clustering algorithm. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Utilizing Support Vector Machines to Recognize Pattern Numbers on Sheet C1 Ballots by Agustian, David, Tri Basuki, Kurniawan, Misinem, ., Edi Surya, Negara, Yesi Novaria, Kunang

    Published 2022
    “…The election vote-counting process can be done automatically by applying machine learning technology, namely computer vision which is usually used for the pattern recognition process in images and videos. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
    Get full text
    Get full text
    Thesis
  12. 12

    An integrated priority-based cell attenuation model for dynamic cell sizing by Amphawan, Angela, Omar, Mohd Nizam, Din, Roshidi

    Published 2012
    “…A new, robust integrated priority-based cell attenuation model for dynamic cell sizing is proposed and simulated using real mobile traffic data.The proposed model is an integration of two main components; the modified virtual community – parallel genetic algorithm (VC-PGA) cell priority selection module and the evolving fuzzy neural network (EFuNN) mobile traffic prediction module.The VC-PGA module controls the number of cell attenuations by ordering the priority for the attenuation of all cells based on the level of mobile level of mobile traffic within each cell.The EFuNN module predicts the traffic volume of a particular cell by extracting and inserting meaningful rules through incremental, supervised real-time learning.The EFuNN module is placed in each cell and the output, the predicted mobile traffic volume of the particular cell, is sent to local and virtual community servers in the VC-PGA module.The VC-PGA module then assigns priorities for the size attenuation of all cells within the network, based on the predicted mobile traffic levels from the EFuNN module at each cell.The performance of the proposed module was evaluated on five adjacent cells in Selangor, Malaysia. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    APPLICATION OF LINK GRAMMAR IN SEMI-SUPERVISED NAMED ENTITY RECOGNITION FOR ACCIDENT DOMAIN by SARI, YUNITA SARI

    Published 2011
    “…In our research, extraction pattern from the first module will be fed to this algorithm and is used to make the prediction of named entity candidate category. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  15. 15

    Development of intelligent hybrid learning system using clustering and knowledge-based neural networks for economic forecasting : First phase by Che Mat @ Mohd Shukor, Zamzarina, Md Sap, Mohd Noor

    Published 2004
    “…We proposed KMeans clustering algorithm that is based on multidimensional scaling, joined with neural knowledge based technique algorithm for supporting the learning module to generate interesting clusters that will generate interesting rules for extracting knowledge from stock exchange databases efficiently and accurately.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Spiking Neural Network For Energy Efficient Learning And Recognition by Wong, Yan Chiew, Wang, Ning Lo

    Published 2020
    “…The use of applications consumes energy and hard to perform through standard programmed algorithms. Spiking neural networks have emerged that achieve favourable advantages in terms of energy and time efficiency by using spikes for computation and communication as well as solving different problems such as pattern classification and image processing. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    Hybrid Models Of Fuzzy Artmap And Qlearning For Pattern Classification by Navan, Farhad Pourpanah

    Published 2015
    “…In this study, the main research focus is on the design and development of hybrid models, combining the supervised Adaptive Resonance Theory (ART) neural network and Reinforcement Learning (RL) models for pattern classification. Specifically, the Fuzzy ARTMAP (FAM) network and Q-learning are adopted as the backbone for designing and developing the hybrid models. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Network intrusion detection and alert system by To, Jin Yi

    Published 2024
    “…Signature-based detection compares network traffic packets with a real-time updated database of known attack patterns, while anomaly-based detection algorithms learn normal behavior patterns and identify deviations. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  20. 20

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
    Get full text
    Get full text
    Get full text
    Thesis