Search Results - (( java implementation learning algorithm ) OR ( pattern reading patterns algorithm ))

Refine Results
  1. 1

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Neural Network Based Pattern Recognition in Visual Inspection System for Intergrated Circuit Mark Inspection by Sevamalai, Venantius Kumar

    Published 1998
    “…Industrial visual machine inspection system uses template or feature matching methods to locate or inspect parts or pattern on parts. These algorithms could not compensate for the change or variation on the inspected parts dynamically. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Fsm-Based Enhanced March C- Algorithm For Memory Built-In Self-Test by CH’NG , MING ZONG

    Published 2017
    “…Through the analysis of the fault patterns and other algorithm, it was found that multiple read operation within a single MARCH element from MARCH-NU algorithm can aid in the identification of the Read Destructive Fault whereas having HOLD time in the MARCH 9N algorithm would expose the Data Retention Fault. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    MELODY TRAINING WITH SEGMENT-BASED TILT CONTOUR FOR QURANIC TARANNUM by Hanum, H.M., Abas, L.H.M., Aziz, A.S., Bakar, Z.A., Diah, N.M., Ahmad, W.F.W., Ali, N.M., Zamin, N.

    Published 2021
    “…A tarannum training prototype is built to test similarity between a userâ��s recitation and the trained patterns. To identify similarity between a pair of verse-contours, the application employs a shape-based contour similarity algorithm. …”
    Get full text
    Get full text
    Article
  6. 6

    Segmentation of Malay syllables in connected digit speech using statistical approach by Salam, M.S., Mohamad, Dzulkifli, Saleh, S.H.

    Published 2008
    “…Patterns used in this experiment are connected digits of 11 speakers spoken in read mode in lab environment and spontaneous mode in classroom environment. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    An Educational Tool Aimed at Learning Metaheuristics by Kader, Md. Abdul, Jamaluddin, Jamal A., Kamal Z., Zamli

    Published 2020
    “…Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    An Intelligent Detection System for Rheumatoid Arthritis (RA) Disease using Image Processing by Hajyyev, Abdyrahym

    Published 2014
    “…Out of five types of staining patterns nucleolar and centromere share similar visual appearance and the same is true to homogeneous, fine-speckled, coarse-speckled patterns. …”
    Get full text
    Get full text
    Final Year Project
  10. 10

    A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment by Ruzita, Ahmad

    Published 2013
    “…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
    Get full text
    Get full text
    Thesis
  12. 12

    An early investigation into raised-line tactile graphics reading behavior among blind and visually impaired individuals by Muhammad Ikmal Hakim Shamsul Bahrin, Hazlina Md Yusof, Shahrul Na’im Sidek, Aimi Shazwani Ghazali

    Published 2024
    “…It was also identified that the frequently performed exploratory procedures among participants were contour following and lateral motions. However, their reading strategies were too random and lacked systematic patterns. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Recent applications in quantitative methods and information technology by Aziz, Nazrina, Abdul-Rahman, Syariza, Zainal Abidin, Norhaslina

    Published 2018
    “…The analyses in each chapter are explained in detail with samples of real applications in daily life to assist readers to appreciate theoretical, algorithm and mathematical formulations.Prior to reading this book, readers are advised to have some basic foundation in statistical sampling, tabu search approach, neural network, algorithms, and mathematical formulation. …”
    Get full text
    Get full text
    Book
  14. 14

    USING LATENT SEMANTIC INDEXING FOR DOCUMENT CLUSTERING by MUFLIKHAH, LAILIL

    Published 2010
    “…Based on the new representation, the documents are then subjected to the clustering algorithm itself, which is Fuzzy c-Means algorithm. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Enhancing user authentication through the implementation of the ForestPA algorithm for smart healthcare systems by Nurul Syafiqah, Zaidi, Al Fahim, Mubarak Ali, Ahmad Firdaus, Zainal Abidin, Ibrahim, Adamu Abubakar, Aldharhani, Ghassan Saleh, Mohd Faizal, Ab Razak

    Published 2025
    “…A model was trained via the forest penalizing attributes (ForestPA) algorithm, which can classify profiles into real or fake profiles on the basis of their behavioral patterns. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Acquisition of context-based word recognition by reinforcement learning using a recurrent neural network by Ahmad Afif, Mohd Faudzi

    Published 2012
    “…The flexible and intelligent recognition is not only depending on the informatiOn that belonged by target object,but also is supported by other information, including past knowledge and contextual information.For an example, when we read a book, we do not usually seem to read it -by recognizing each character one by one. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Acquisition of context-based word recognition by reinforcement learning using a recurrent neural network by Ahmad Afif, Mohd Faudzi

    Published 2012
    “…For an example, when we read a book, we do not usually seem to read it -by recognizing each character one by one. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Acquisition of context-based word recognition by reinforcement learning using a recurrent neural network by Ahmad Afif, Mohd Faudzi

    Published 2012
    “…The flexible and intelligent recognition is not only depending on the informatiOn that belonged by target object,but also is supported by other information, including past knowledge and contextual information.For an example, when we read a book, we do not usually seem to read it -by recognizing each character one by one. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  20. 20

    Dyslexia handwriting detection using Convolutional Neural Network (CNN) algorithm / Sofea Najihah Mohd Zaki by Mohd Zaki, Sofea Najihah

    Published 2024
    “…Convolutional Neural Network (CNN) algorithm was chosen as one of the possible solutions after a thorough analysis of many algorithms for dyslexic handwriting identification. …”
    Get full text
    Get full text
    Thesis