Search Results - (( java implementation learning algorithm ) OR ( user validation mining algorithm ))

Refine Results
  1. 1

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Energy efficiency of the bitcoin mining hardware and related blockchain technology by Noor Faiqah Izzati, Afandi

    Published 2018
    “…MATLAB is used in developing and validation the algorithm. Dataset was selected from open sources and applied in the proposed formula to evaluate and predict energy efficiency of bitcoin mining hardware. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  3. 3
  4. 4

    Social media mining: a genetic based multiobjective clustering approach to topic modelling by Rayner Alfred, Loo Yew Jie, Joe Henry Obit, Yuto Lim, Haviluddin Haviluddin, Azreen Azman

    Published 2021
    “…Social media mining is the process of collecting large datasets from user-generated content and extracting and analyzing social media interactions to recognize meaningful patterns in individual and social behavior. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Social media mining: a genetic based multiobjective clustering approach to topic modelling by Alfred, Rayner, Loo, Yew Jie, Obit, Joe Henry, Lim, Yuto, Haviluddin, Haviluddin, Azman, Azreen

    Published 2021
    “…Social media mining is the process of collecting large datasets from user-generated content and extracting and analyzing social media interactions to recognize meaningful patterns in individual and social behavior. …”
    Get full text
    Get full text
    Article
  6. 6

    Dominance analyses reduction in skyline query processing over data stream with data mining technique by Ahmed Mohamud, Mudathir, Ibrahim, Hamidah, Sidi, Fatimah, Mohd Rum, Siti Nurulain

    Published 2025
    “…DAR employs the Apriori algorithm, one of the most prevalent data mining algorithms, to identify the frequently occurring dominance analyses. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    An Educational Tool Aimed at Learning Metaheuristics by Kader, Md. Abdul, Jamaluddin, Jamal A., Kamal Z., Zamli

    Published 2020
    “…Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment by Ruzita, Ahmad

    Published 2013
    “…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Sequential pattern mining using personalized minimum support threshold with minimum items by Alias, Suraya, Razali, Mohd Norhisham, Tan, Soo Fun, Sainin, Mohd Shamrie

    Published 2011
    “…In this paper, a personalized minimum support (P_minsup) threshold with user specified minimum items or min_i is introduced. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Machine Learning Regression Approach for Estimating Energy Consumption of Appliances in Smart Home by Husin N.S.I.M., Mostafa S.A., Jaber M.M., Gunasekaran S.S., Al-Shakarchi A.H., Abdulsattar N.F.

    Published 2024
    “…The time-series datasets, namely appliance energy prediction datasets, are used for training and testing the algorithms. The Cross-Industry Standard Process for Data Mining (CRISP-DM) methodology, which comprises six processing phases, was employed in this work. …”
    Conference Paper
  12. 12

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Enhanced mechanism to handle missing data of Hadith classifier by Aldhlan, Kawther A., Zeki, Ahmed M., Zeki, Akram M.

    Published 2011
    “…Decision tree algorithms have the ability to deal with missing values or wrong data. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  14. 14

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  16. 16

    Exploring the impact of social media on political discourse: a case study of the Makassar mayoral election by Jufri, Aedah, Abd Rahman, Suarga, .

    Published 2024
    “…To increase the accuracy and efficiency of text mining operations, especially in result validation, text clustering, and classification, the k-means algorithm and support vector machines (SVM) were used. …”
    Get full text
    Get full text
    Get full text
    Journal
  17. 17

    The Crop Price Prediction Using Machine Learning: Preliminary Stage by Ramya, T.K., Shreedhara N, Hegde, Mohd Norshahriel, Abd Rani

    Published 2024
    “…The back-end predictive model for this project is created utilizing machine learning algorithms. The steps involved in creating a predictive model are data collecting, data cleaning, data mining, and validation. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18
  19. 19

    Integration of object-based image analysis and data mining techniques for detailes urban mapping using remote sensing by Hamedianfar, Alireza

    Published 2015
    “…The reproducible and transferable novel models were proposed based on (1) user-defined OBIA rule sets and (2) data mining (DM) techniques. …”
    Get full text
    Get full text
    Thesis
  20. 20