Search Results - (( java implementation learning algorithm ) OR ( program case sizing algorithm ))

Refine Results
  1. 1

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Firefly algorithm for optimal sizing of Standalone Photovoltaic System / Nurizzati Abdul Aziz by Abdul Aziz, Nurizzati

    Published 2016
    “…Therefore, optimization methods are often used in the sizing algorithms for such systems. This study presents the development of Firefly Algorithm-based Sizing Algorithm, known as FASA for sizing optimization of SAPV systems. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Firefly algorithm for optimal sizing of stand-alone photovoltaic system / Nur Izzati Abdul Aziz by Abdul Aziz, Nur Izzati

    Published 2016
    “…Therefore, optimization methods are often used in the sizing algorithms for such systems. This study presents the development of firefly algorithm-based sizing algorithm, known as FASA for sizing optimization of SAPV systems. …”
    Get full text
    Get full text
    Thesis
  4. 4

    An Educational Tool Aimed at Learning Metaheuristics by Kader, Md. Abdul, Jamaluddin, Jamal A., Kamal Z., Zamli

    Published 2020
    “…Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment by Ruzita, Ahmad

    Published 2013
    “…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Pairwise testing tools based on hill climbing algorithm (PTCA) by Lim, Seng Kee

    Published 2014
    “…The actual implementation of the algorithm which is in Java programming language, the program is implemented on Net Bean 7.0.1. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  8. 8

    A study on the VLSI partitions: the implementation of Fiduccia-Mattheyses algorithm / Burhanuddin Omar by Omar, Burhanuddin

    Published 1997
    “…An iterative mincut heunstic for partitioning networks is presented whose worst case computation time, per pass, grows linearly with the size of the network. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Augmentation of basic-line-search and quick-simplex-method algorithms to enhance linear programming computational performance by Nor Azlan, Nor Asmaa Alyaa

    Published 2021
    “…With problem size of m = 5, n = 5, and 20% of nonzeroes in constraints matrix, the result of the iteration number was as follows: new augmentation algorithm = 1, QSM = 2, BLSA = 3, and Simplex = 6, and with problem size of m = 100, n = 100, and 80% of nonzeroes in constraints matrix, the result of the iteration number was as follows: new augmentation algorithm = 78, QSM = 84, BLSA = 87, and Simplex = 99. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Long-term optimal planning of distributed generations and battery energy storage systems towards high integration of green energy considering uncertainty and demand response progra... by Ba-swaimi S., Verayiah R., Ramachandaramurthy V.K., ALAhmad A.K.

    Published 2025
    “…It simultaneously minimizes three long-term objectives: total cost, power loss, and voltage deviation by determining the optimal locations and sizes for wind-DGs, PV-DGs, and BESSs. Additionally, the model incorporates a demand response program (DRP) to enhance green energy integration further. …”
    Article
  14. 14

    Adaptive Embedded Clonal Evolutionary Programming (AECEP) for optimal Distributed Generation (DG) location and sizing in a distribution system by Nur Zahirah, Mohd Ali

    Published 2013
    “…AI methods mainly include Artificial Neural Network (ANN), Expert System (ES), Genetic Algorithm (GA), Evolutionary Programming (EP), Ant Colony Optimization (ACO) and Particle Swarm Optimization (PSO). …”
    Get full text
    Get full text
    Thesis
  15. 15

    Battery energy storage system sizing using PSO algorithm in DIgSILENT powerfactory by Gan, Chin Kim, Tan, Pi Hua, Al-Areqi, Khaldon Ahmed Qaid, Tee, Wei Hown

    Published 2022
    “…The IEEE 9-bus system is the test case used to demonstrate and discuss the application of algorithms in DPL script. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    A Community-Based Fault Isolation Approach for Effective Simultaneous Localization of Faults by Zakari, Abubakar, Lee, Sai Peck, Targio Hashem, Ibrahim Abaker

    Published 2019
    “…The approach is evaluated on eight subject programs ranging from medium-sized to large-sized programs (tcas, replace, gzip, sed, flex, grep, make, and ant). …”
    Get full text
    Get full text
    Article
  17. 17

    Chaotic mutation immune evolutionary programming for voltage security with the presence of DGPV by Mustaffa S.A.S., Musirin I., Othman M.M., Mansor M.H.

    Published 2023
    “…The simulation results are also compared with Evolutionary Programming (EP) and Chaotic Evolutionary Programming (CEP) and it is found that CMIEP performed better in most of the cases. � 2017 Institute of Advanced Engineering and Science. …”
    Article
  18. 18
  19. 19

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  20. 20