Search Results - (( java implementation learning algorithm ) OR ( program selection clustering algorithm ))

Refine Results
  1. 1

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    A Community-Based Fault Isolation Approach for Effective Simultaneous Localization of Faults by Zakari, Abubakar, Lee, Sai Peck, Targio Hashem, Ibrahim Abaker

    Published 2019
    “…During program testing, software programs may be discovered to contain multiple faults. …”
    Get full text
    Get full text
    Article
  4. 4

    Enhancement Of Clustering Algorithm Using 3D Euclidean Distance To Improve Network Connectivity In Wireless Sensor Networks For Correlated Node Behaviours by Kalid Abdlkader Marsal Salih

    Published 2024
    “…Then, the enhancement clustering algorithm will be constructed based on correlated degree which is selected as a cluster head to serves as a link connectivity between individual node and its neighbor to form network clustering. …”
    thesis::doctoral thesis
  5. 5

    Fuzzy subtractive clustering (FSC) with exponential membership function for heart failure disease clustering by Annisa Eka Haryati, ., Sugiyarto, Surono, Tommy Tanu, Wijaya, Goh, Khang Wen, Aris, Thobirin

    Published 2022
    “…It simulated and processed using Fuzzy Subtractive Clustering Algorithm, Jupyter Notebook Software with Python programming language. …”
    Get full text
    Get full text
    Article
  6. 6

    An Educational Tool Aimed at Learning Metaheuristics by Kader, Md. Abdul, Jamaluddin, Jamal A., Kamal Z., Zamli

    Published 2020
    “…Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment by Ruzita, Ahmad

    Published 2013
    “…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    A cluster-based hybrid replica control protocol for high availability in data grid by Mabni, Zulaile

    Published 2019
    “…Another proposed algorithm is replica placement algorithm which selects and places only one replica in each cluster. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Feature clustering for pso-based feature construction on high-dimensional data by Swesi, Idheba Mohamad Ali Omer, Abu Bakar, Azuraliza

    Published 2019
    “…The Redundancy-Based Feature Clustering (RFC) algorithm was applied to choose the most informative features from the original data, while PSO was used to construct new features from those selected by RFC. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    An evaluation of Monte Carlo-based hyper-heuristic for interaction testing of industrial embedded software applications. by S. Ahmed, Bestoun, Enoiu, Eduard, Afzal, Wasif, Kamal Z., Zamli

    Published 2020
    “…Hyper-heuristic is a new methodology for the adaptive hybridization of meta-heuristic algorithms to derive a general algorithm for solving optimization problems. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
    Get full text
    Get full text
    Thesis
  13. 13

    A Multi-Criteria Decision-Making Approach for Targeted Distribution of Smart Indonesia Card (KIP) Scholarships by Komang, Aryasa

    Published 2025
    “…In the clustering stage, the combination of PCA+KMedoids with two initial medoids produced stable clusters in all iterations, suggesting that K-Medoids provided a better representation of data variation. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    Linear programming approach for scheduling sports league problems in Malaysia by Ahmad Rosdi, Muhammad Ifwat

    Published 2017
    “…In order to solve the formulated LP model, we proposed several solution methods such as simplex and genetics algorithm. Besides, we also consider large problems in our formulated model as we introduced the cluster approach. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Effective software fault localization based on complex network theory / Abubakar Zakari by Abubakar , Zakari

    Published 2019
    “…In the case where a developer has checked 70% of the program statements and cannot fully localize all the multiple faults in a single diagnosis rank list, rather than resorting to using OBA bugging approach, a newly proposed community-based fault isolation approach that makes use of a divisive network community clustering algorithm is applied to aid in isolating faults into different fault-focused communities (clusters), each targeting a single fault. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Enhancing teaching and learning through data-driven optimization of servicing code demand and lecturer allocation using WEKA analysis by Rochin Demong, Nur Atiqah, Mohamed Razali, Murni Zarina, Kamaruddin, Juliana Noor, Shamsuddin, Sazwan, Awang, Nor Ain, Kamarudin, Norjuliatie, Wan Othman, Noor Faradilla

    Published 2025
    “…Attribute selection through Information Gain Attrite Evaluation model highlighted Program Code, Course Code and Type of Course as the strongest predictors of course approval and demand levels. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Implementation of Hybrid Indexing, Clustering and Classification Methods to Enhance Rural Development Programme in South Sulawesi by Muhammad, Faisal

    Published 2024
    “…The Fuzzy Tsukamoto and Smallest of Maximum methods were then used to classify villages into less development, which involved CSLI-Clusters as indicators. Using the cosine similarity algorithm for knowledge recommendation is village identified, utilizing community feedback as the foundation. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise