Search Results - (( java implementation learning algorithm ) OR ( pre evaluation case algorithm ))

Refine Results
  1. 1

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    An Educational Tool Aimed at Learning Metaheuristics by Kader, Md. Abdul, Jamaluddin, Jamal A., Kamal Z., Zamli

    Published 2020
    “…Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment by Ruzita, Ahmad

    Published 2013
    “…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Case Slicing Technique for Feature Selection by A. Shiba, Omar A.

    Published 2004
    “…Case Slicing Technique (CST) helps in identifying the subset of features used in computing the similarity measures needed by classification algorithms. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Modified word representation vector based scalar weight for contextual text classification by Abbas Saliimi, Lokman

    Published 2024
    “…To validate this algorithm, the modified word vectors are compared with original LLM-generated word vectors to evaluate their reflection of the intended context. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11
  12. 12

    Development of an effective clustering algorithm for older fallers by Goh, Choon Hian, Wong, Kam Kang, Tan, Maw Pin *, Ng, Siew Cheok, Chuah, Yea Dat, Kwan, Ban Hoe

    Published 2022
    “…The proposed fall risk clustering algorithm grouped the subjects according to features. …”
    Get full text
    Get full text
    Article
  13. 13

    Block based low complexity iterative QR precoder structure for Massive MIMO by Mok, Li Suet

    Published 2021
    “…We also study one of the suboptimal pre-coding solutions known as Block-diagonalization (BD) applicable in the case where a receiver has multiple antennas and compare their performance. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  15. 15
  16. 16

    Collaboration of integrative processes intermediaries supporting supply chain management by Mohd Tamrin, Mohd Izzuddin, Sembok, Tengku Mohd

    Published 2012
    “…The ongoing interactions are also important after the execution of the pre-planned activities to monitor and restructure the processes in case of deviation occurred in the middle of execution. …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  17. 17

    Design of QFT-based self-tuning deadbeat controller by Mansor, Hasmah, Mohd Noor, Samsul Bahari

    Published 2013
    “…Using a grain dryer plant model as a pilot case-study, the performance of the proposed method has been evaluated and analyzed. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Design of QFT-based self-tuning deadbeat controller by Mansor, Hasmah, Mohd Noor, Samsul Bahari

    Published 2013
    “…Using a grain dryer plant model as a pilot case-study, the performance of the proposed method has been evaluated and analyzed. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Instance matching framework for heterogeneous semantic web content over linked data environment by Mansir, Abubakar

    Published 2021
    “…The output of each algorithm is evaluated, the results have shown that each algorithm performs well and outperforms the existing algorithms on all test cases in terms better output generation and effective handling of heterogeneity from different domains, which is a necessary concern in all data-intensive problems. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Forecast innovative development level in green supply chains using a comprehensive fuzzy algorithm by Delgoshaei, Aidin, Beighizadeh, Razieh, Mohd Arffin, Mohd Khairol Anuar, Leman, Zulkiflle, Ali, Ahad

    Published 2022
    “…The suggested support vector machine model was also evaluated in 30 case studies, demonstrating that the model is capable of accurately forecasting technological advancement in green supply chains (score: 0.81). …”
    Get full text
    Get full text
    Article