Search Results - (( java implementation learning algorithm ) OR ( program affecting connection algorithm ))

  • Showing 1 - 20 results of 20
Refine Results
  1. 1

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    An Educational Tool Aimed at Learning Metaheuristics by Kader, Md. Abdul, Jamaluddin, Jamal A., Kamal Z., Zamli

    Published 2020
    “…Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment by Ruzita, Ahmad

    Published 2013
    “…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Enhancement Of Clustering Algorithm Using 3D Euclidean Distance To Improve Network Connectivity In Wireless Sensor Networks For Correlated Node Behaviours by Kalid Abdlkader Marsal Salih

    Published 2024
    “…When compared with other algorithms, the connectivity of network using the clustering algorithm increased by 11% for ECA, 17% for LEACH, 20% for EEC, 23% for R-HEED, 14% for PEGASIS, and 15% for LCA. …”
    thesis::doctoral thesis
  6. 6

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Quality of service in mobile IP networks with parametric multi-channel routing algorithms based on linear programming approach by Gholizadeh, Somayyeh

    Published 2018
    “…This approach tunes the parameters of the linear programming models that are used in the other algorithms by using a dynamic element. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Novice programmers’ emotion and competency assessments using machine learning on physiological data / Fatima Jannat by Fatima, Jannat

    Published 2022
    “…The result implies a good connection between how a novice programmer goes through a programming problem and his/her emotional arousal at that moment. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Development Of Semi-Automatic Liver Segmentation Method For Three-Dimensional Computed Tomography Dataset by Chiang, Yi Fan

    Published 2017
    “…The liver segmentation program with proposed algorithm is evaluated with CT datasets obtained from SLIVER07 to prove its effectiveness in liver segmentation. …”
    Get full text
    Get full text
    Monograph
  11. 11

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  12. 12
  13. 13
  14. 14

    Effects of Authentication of Users in Mobile Internet Protocol Version 6 by Obenofunde, Simon Tabi

    Published 2004
    “…The results show that the average delay is not much affected by the implementation of the program. The network performance is greatly affected by the number .of packet present in the network at any given time. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Image processing based vehicle's license plate tracking and recognition system by Lorita Angeline

    Published 2013
    “…Designing and developing of the ALPR system is programmed in MATLAB m-file. Evaluations and assessments have been carried out and observational results show an improvement of 32% in license plate localisation by using Signature Analysis and the improved Connected Component Analysis (SAICCA) compared to the conventional Connected Component Analysis (CCA).…”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions by Saraswati, Galuh Wilujeng

    Published 2017
    “…The project has also implemented the optimization process onto the proposed ANFIS model through the hybrid of Genetic Algorithm on the fuzzy membership function of the ANFIS model. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    DC-based PV-powered home energy system by Sabry, Ahmad H.

    Published 2017
    “…In a solar charge controller, the present MPPT based systems still have losses due to the switching of their semiconductor devices producing a rise in temperature that negatively affects the overall system. A controller based on an algorithm of one time maximum power point (MPP) is proposed to mitigate those losses. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Design and development of iRemote Terminal Unit (iRTU) for undervoltage and overvoltage fault by Wan Nor Shela Ezwane, Wan Jusoh

    Published 2014
    “…In order to ensure the iRTU system achieve its objectives, the methodology uses consists of OrCAD software to design and develop the iRTU circuit board, MPLAB software to program the microcontroller-base, Visual Basic software to create the GUI interfacing for the monitoring system and XBee as a communication media to connect iR TU to the control unit in short distances. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Foldable Structures Adapted From Tessellation Origami With High Degree Of Freedom by Chai, Chen Chu

    Published 2018
    “…The second objective is the development of an alternative simulation approach using generative algorithm. A generative modeling tool using visual programming editor Grasshopper® which provides a more realistic simulation tool by incorporating the kinematic property of the origami was developed. …”
    Get full text
    Get full text
    Thesis