Search Results - (( java implementation learning algorithm ) OR ( pattern using six algorithm ))

Refine Results
  1. 1

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    An Educational Tool Aimed at Learning Metaheuristics by Kader, Md. Abdul, Jamaluddin, Jamal A., Kamal Z., Zamli

    Published 2020
    “…Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment by Ruzita, Ahmad

    Published 2013
    “…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Parallel implementation on improved error signal of backpropagation algorithm by Mohd Aris, Teh Noranis

    Published 2001
    “…Twenty-six patterns consisting of uppercase letters from 'A' to 'Z' are tested in the experiments. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Integration of zero and sequential algorithm in shuffle exchange with Minus One Stage by Md Yunus, Nur Arzilawati, Othman, Mohamed, Mohd Hanapi, Zurina

    Published 2013
    “…The algorithms consist of six algorithms namely ZeroX, ZeroY, ZeroXbit, ZeroYbit, Sequential Increasing and Sequential Decreasing algorithm. …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Frequent Lexicographic Algorithm for Mining Association Rules by Mustapha, Norwati

    Published 2005
    “…The primary concept of association rule algorithms consist of two phase procedure. In the first phase, all frequent patterns are found and the second phase uses these frequent patterns in order to generate all strong rules. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Enhanced grey wolf optimisation algorithm for feature selection in anomaly detection by Almazini, Hussein

    Published 2022
    “…The second modification develops a new position update mechanism using the Bat Algorithm movement. The third modification improves the controlled parameter of the MBGWO algorithm using indicators from the search process to refine the solution. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Pemahaman guru matematik Tahun Enam tentang pembahagian nombor bulat / Hoi Sim Min by Hoi , Sim Min

    Published 2018
    “…This study also found that teachers have four general patterns of thought and an algorithm to solve the problem of division of whole numbers, that is, the general pattern of thought of partition, measurement, repeated subtraction, the inverse of multiplication , and long division algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Coronary artery segmentation in angiograms with pattern recognition techniques - a survey by Tayebi, Rohollah Moosavi, Sulaiman, Puteri Suhaiza, O. K. Rahmat, Rahmita Wirza, Dimon, Mohd Zamrin, Kadiman, Suhaini, Abdullah, Lilly Nurliyana, Mazaheri, Samaneh

    Published 2013
    “…In this paper, we have divided these algorithms into five major classes and propose a survey for the main class, pattern recognition, which is a famous technique in this manner. …”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    An empirical study of pattern leakage impact during data preprocessing on machine learning-based intrusion detection models reliability by Bouke, Mohamed Aly, Abdullah, Azizol

    Published 2023
    “…Data leakage, also known as pattern leakage, occurs during data preprocessing when information from the testing set is used in training, leading to overfitting and inflated accuracy scores. …”
    Get full text
    Get full text
    Article
  14. 14

    Partitional clustering algorithms for highly similar and sparseness y-short tandem repeat data / Ali Seman by Seman, Ali

    Published 2013
    “…Six Y-STR data sets were used as a benchmark to evaluate the performances of the algorithm against the other eight partitional clustering algorithms. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  16. 16

    A Comparative Study Of Fuzzy C-Means And K-Means Clustering Techniques by Sharifah Sakinah, Syed Ahmad

    Published 2014
    “…Then, we apply six datasets to measure the quality of clustering result based on the similarity measure used in the algorithm and its representation of clustering result. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Parallel implementation on improved error signal of backpropagation algorithm by Mohd Aris, Teh Noranis, Sulaiman, Md. Nasir, Mohd Saman, Md. Yazid, Othman, Mohamed

    Published 2002
    “…Data partitioning method, with columnwise block striped and batch mode weight updating strategy, is applied on the BP algorithms. Twenty-six patterns consisting of uppercase letters from ‘A’ to ‘Z’ are tested in terms of speed and recognition rates. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Foldable Structures Adapted From Tessellation Origami With High Degree Of Freedom by Chai, Chen Chu

    Published 2018
    “…The second objective is the development of an alternative simulation approach using generative algorithm. A generative modeling tool using visual programming editor Grasshopper® which provides a more realistic simulation tool by incorporating the kinematic property of the origami was developed. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20