Search Results - (( java implementation learning algorithm ) OR ( programming assessing efficiency algorithm ))

Refine Results
  1. 1

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    An Educational Tool Aimed at Learning Metaheuristics by Kader, Md. Abdul, Jamaluddin, Jamal A., Kamal Z., Zamli

    Published 2020
    “…Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment by Ruzita, Ahmad

    Published 2013
    “…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Swarm inspired test case generation for online C++ programming assessment by Foong, O.-M., Tran, Q.-T., Yong, S.-P., Rais, H.M.

    Published 2014
    “…It is time consuming for lecturers to manually compile, run and verify students' programming assignments. Moreover, they also need to define test cases for different programming exercises in order to assess students' code. …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Optimizing Visual Sensors Placement with Risk Maps Using Dynamic Programming by Altahir, A.A., Asirvadam, V.S., Sebastian, P., Hamid, N.H.B., Ahmed, E.F.

    Published 2022
    “…Then, the dynamic programming algorithm operates on security quantified maps rather than uniform grids. …”
    Get full text
    Get full text
    Article
  8. 8

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    An Information Retrieval Algorithm to Extract Influential Factors by Nabilah Filzah, Mohd Radzuan

    Published 2012
    “…Past literatures showed that there are many factors that can be used to assess company’s performance but only a limited number of factors are needed to efficiently assess its performance. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    An analysis on the applicability of meta-heuristic searching techniques for automated test data generation in automatic programming assessment by Musa, Ja’afar, Romli, Rohaida, Yusoff, Nooraini

    Published 2019
    “…Automatic Programming Assessment (APA) has been gaining lots of attention among researchers mainly to support automated grading and marking of students’ programming assignments or exercises systematically. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Optimization of energy management system for fuel-cell hybrid electric vehicles: Issues and recommendations by Sulaiman N., Hannan M.A., Mohamed A., Ker P.J., Majlan E.H., Wan Daud W.R.

    Published 2023
    “…Computer circuits; Dynamic programming; Energy efficiency; Energy management; Fossil fuel deposits; Fossil fuels; Fuel cells; Fuel storage; Fuzzy logic; Genetic algorithms; Global warming; Greenhouse gases; Hybrid vehicles; Internal combustion engines; Linear programming; Logic Synthesis; Optimization; Particle swarm optimization (PSO); Supercapacitor; Battery; Energy management systems (EMS); Fuel cell hybrid electric vehicles; Hybrid-electric vehicle technologies; Internal combustion engine vehicles; Optimization algorithms; Optimization techniques; Pontryagin's minimum principles; Energy management systems; combustion; electric vehicle; energy storage; equipment component; fossil fuel; fuel cell; fuel consumption; global warming; greenhouse gas; hydrogen; optimization; performance assessment…”
    Review
  14. 14

    Application of genetic algorithm and JFugue in an evolutionary music generator by Tang, Jia Rou

    Published 2025
    “…This project explores the application of Genetic Algorithms (GA) with JFugue, which is a Java-based music programming library to develop an Evolutionary Music Generator. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  15. 15

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  16. 16

    Some metaheuristic algorithms for solving multiple cross-functional team selection problems by Ngo, S.T., Jaafar, J., Izzatdin, A.A., Tong, G.T., Bui, A.N.

    Published 2022
    “…We introduced a method that combines a compromise programming (CP) approach and metaheuristic algorithms, including the genetic algorithm (GA) and ant colony optimization (ACO), to solve the proposed optimization problem. …”
    Get full text
    Get full text
    Article
  17. 17

    Optimized placement, sizing, and selection of distributed generation using the salp swarm algorithm by Mat Yasin, Zuhaila, Mohammad Noor, Siti Zaliha, Hassan, Elia Erwani, M. Shami, Tareq

    Published 2025
    “…A benchmark comparison is performed to assess the effectiveness of the proposed SSA method against the evolutionary programming (EP) approach. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Long-term electrical energy consumption: Formulating and forecasting via optimized gene expression programming / Seyed Hamidreza Aghay Kaboli by Seyed Hamidreza , Aghay Kaboli

    Published 2018
    “…To assess the applicability and accuracy of the proposed method for long-term electrical energy consumption, its estimates are compared with those obtained from artificial neural network (ANN), support vector regression (SVR), adaptive neuro-fuzzy inference system (ANFIS), rule-based data mining algorithm, GEP, linear, quadratic and exponential models optimized by particle swarm optimization (PSO), cuckoo search algorithm (CSA), artificial cooperative search (ACS) algorithm and backtracking search algorithm (BSA). …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    AI recommendation penetration testing tool for SQL injection: linear regression by Ahmad Fuad, Norshahira Elliyana, Saad, Shahadan

    Published 2025
    “…This technique involves the development and implementation of an algorithm designed to improve the efficiency of security evaluations by suggest the suitable penetration testing tools. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20