Search Results - (( java implementation learning algorithm ) OR ( program generation modified algorithm ))
Search alternatives:
- implementation learning »
- java implementation »
- learning algorithm »
- program generation »
-
1
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
2
A modified shuffled frog leaping algorithm and its application to short-term hydrothermal scheduling / Mohamad Khairul Hakimi Abdul Hady
Published 2016“…This paper presents a modified shuffled frog leaping algorithm in order to accelerate the global search solution. …”
Get full text
Get full text
Thesis -
3
Optimal power flow based on fuzzy linear programming and modified Jaya algorithms
Published 2017“…In addition, two novel Jaya-based methods namely, the modified Jaya (MJaya) algorithm and quasi-oppositional modified Jaya (QOMJaya) algorithm are proposed to solve different MOOPF problems. …”
Get full text
Get full text
Thesis -
4
An Educational Tool Aimed at Learning Metaheuristics
Published 2020“…Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
Get full text
Get full text
Get full text
Thesis -
6
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
Get full text
Get full text
Get full text
Thesis -
7
Formulating and solving stochastic truck and trailer routing problems using meta-heuristic algorithms / Seyedmehdi Mirmohammadsadeghi
Published 2015“…For solving TTRP, a variety of algorithms have been applied earlier but TTRPSD programming has not yet solved. …”
Get full text
Get full text
Get full text
Thesis -
8
Hybrid meta-heuristic algorithm for solving multi-objective aggregate production planning in fuzzy environment
Published 2017“…For these proposed approaches, this study adopted a hybridization of a fuzzy programming, modify simulated annealing, and simplex downhill (SD) algorithm called Fuzzy-MSASD to resolve multiple objective linear programming APP problems in a fuzzy environment. …”
Get full text
Get full text
Thesis -
9
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
10
Enhanced Intelligent Water Drops Algorithm for University Examination Timetabling Problems
Published 2024“…This was addressed by modifying the Adapted-IWD. The modified version is called Modified-IWD. …”
thesis::doctoral thesis -
11
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
12
-
13
An evaluation of Monte Carlo-based hyper-heuristic for interaction testing of industrial embedded software applications.
Published 2020“…The limited application of combinatorial test generation on industrial programs can impact the use of such techniques as Q-EMCQ. …”
Get full text
Get full text
Get full text
Article -
14
Power system network splitting and load frequency control optimization using ABC based algorithms / Kanendra Naidu a/l Vijyakumar
Published 2015“…This research presents a modified optimization program for the system splitting problem in large scale power system based on Artificial Bee Colony algorithm and graph theory. …”
Get full text
Get full text
Thesis -
15
Multiple and solid data background scheme for testing static single cell faults on SRAM memories
Published 2013“…Therefore, the purpose of this thesis is to introduce a Data Background (DB) scheme to generate an optimal March Test Algorithm (MTA) for detecting faults of memory that are undetectable using existing algorithms. …”
Get full text
Get full text
Thesis -
16
Tracking student performance in introductory programming by means of machine learning
Published 2023Conference Paper -
17
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
18
Integrated supply chain planning under uncertainty using an improved stochastic approach
Published 2011“…In the improved solution method, the sample average approximation technique is integrated with the accelerated Benders’ decomposition approach to improvement of the mixed integer linear programming solution phase. The surrogate constraints method will be utilized to acceleration of the decomposition algorithm. …”
Get full text
Get full text
Get full text
Article -
19
Comparative of rivest-shamir-adleman Cryptosystem and its four variants using running time and memory Consumption analysis
Published 2024“…Firstly, they examined each algorithm of the RSA variants and analysed them according to the proposed methodology. …”
Get full text
Get full text
Get full text
Article -
20
Comparative of Rivest-Shamir-Adleman cryptosystem and its four variants using running time and memory consumption analysis
Published 2024“…Firstly, they examined each algorithm of the RSA variants and analysed them according to the proposed methodology. …”
Get full text
Get full text
Get full text
Article
