Search Results - (( java implementation learning algorithm ) OR ( towards implementation phase algorithm ))*

Refine Results
  1. 1

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    An Educational Tool Aimed at Learning Metaheuristics by Kader, Md. Abdul, Jamaluddin, Jamal A., Kamal Z., Zamli

    Published 2020
    “…Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment by Ruzita, Ahmad

    Published 2013
    “…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Multi-objective optimisation of assembly line balancing type-e problem with resource constraints by Masitah, Jusop

    Published 2016
    “…The results indicate that NSGA-II has the ability to explore the search space and has better accuracy of solution towards Pareto-optimal front. The validation phase from the industrial case study concluded that the proposed methodology and algorithm can be implemented in industries. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Frequent Lexicographic Algorithm for Mining Association Rules by Mustapha, Norwati

    Published 2005
    “…The primary concept of association rule algorithms consist of two phase procedure. In the first phase, all frequent patterns are found and the second phase uses these frequent patterns in order to generate all strong rules. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Bees algorithm enhanced with Nelder and Mead method for numerical function optimisation by Kamaruddin, Shafie, Bahari, Muhammad Syahril, Pham, Duc Truong, Mohd Amin Hamzas, Mohd Fidzwan, Zakaria, S

    Published 2019
    “…In order to enhance its accuracy and convergence rate, it is proposed to employ the Nelder and Mead (NM) method to implement the local search phase of the algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  12. 12

    Detecting Remote-To-Local (R2L) attack using Decision Tree algorithm / Ahmad Nasreen Aqmal Mohd Nordin by Mohd Nordin, Ahmad Nasreen Aqmal

    Published 2024
    “…The implementation phase focuses on the deployment of the Decision Tree algorithm and system evaluation through functionality testing. …”
    Get full text
    Get full text
    Thesis
  13. 13

    A hybrid model of system dynamics and genetic algorithm to increase crude palm oil production in Malaysia by Mohd Zabid, M. Faeid

    Published 2018
    “…The hybrid of SD-GA through phase optimization process is capable to recommend policies that are plausible to be implemented to avoid unwarranted shock to the industry. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15
  16. 16

    Development of a Raspberry Pi Drowsiness Detection System based on Histogram of Oriented Gradient (HOG) Algorithm and Eye Aspect Ratio (EAR) Formula by Francis Xavier, Sam Daniel

    Published 2020
    “…As overall, this paper proposes the development of a cost and power saving and effective drowsiness detection system by implementing EAR formula and HOG algorithm, which would be easily fixed and utilized in all type of four-wheeled vehicles.…”
    Get full text
    Get full text
    Final Year Project
  17. 17

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    A secured data transform-and-transfer algorithm for energy internet-of-things applications by Alghaili A.M., Kasim H., Alhada N.M.

    Published 2023
    “…Hence, there is a need to consider DT-related processes carefully specifically while designing phase. DT contributes to many services. It can, for example, contribute to implement security tasks applied to digital contents and therefore can be applied to change contents being secured. …”
    Article
  19. 19

    A proposed model for the selection of workers on crowdsourcing platforms utilizing nested criteria matching by Cucus, Ahmad, Mubarak Ali, Al-Fahim, Zafril Rizal, M. Azmi

    Published 2024
    “…In this study, we examine the worker selection mechanism as explored in prior research and put forth a novel worker selection model incorporating a profile matching algorithm. The subsequent phase involves enhancing the profile matching algorithm to accommodate nested criteria for matching worker requirements. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions by Saraswati, Galuh Wilujeng

    Published 2017
    “…The project has also implemented the optimization process onto the proposed ANFIS model through the hybrid of Genetic Algorithm on the fuzzy membership function of the ANFIS model. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis