Search Results - (( java implementation learning algorithm ) OR ( using action using algorithm ))

Refine Results
  1. 1

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    An Educational Tool Aimed at Learning Metaheuristics by Kader, Md. Abdul, Jamaluddin, Jamal A., Kamal Z., Zamli

    Published 2020
    “…Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment by Ruzita, Ahmad

    Published 2013
    “…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Enhanced Q-Learning algorithm for potential actions selection in automated graphical user interface testing by Goh, Kwang Yi

    Published 2023
    “…We utilized the enhanced Q-Learning algorithm to compare actions, including context-based actions, to effectively achieve higher code coverage. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    An Improved Action Key Frames Extraction Algorithm for Complex Colour Video Shot Summarization by Mizher, Manar Abduljabbar Ahmad, Ang, Mei Choo, Sheikh Abdullah, Siti Norul Huda, Kok, Weng Ng

    Published 2019
    “…We then evaluated the Improved AKF algorithm with the-state-of-the-art algorithms in terms of compression ratio using Paul videos and Shih-Tang dataset. …”
    Get full text
    Get full text
    Article
  9. 9

    STUDIES ON COMPARISON OF PROPORTIONAL ON ERROR WITH PROPORTIONAL ON MEASURED VALUE IN PID CONTROLLERS by WAN MOHD RUSHIDI, WAN AMIR HAKIMI

    Published 2019
    “… PID Controllers have different algorithms or methods in which the controller action is based on Error or Process Variable (PV). …”
    Get full text
    Get full text
    Final Year Project
  10. 10

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  11. 11

    Knowledge base tuning using genetic algorithm for fuzzy behavior-based autonomous mobile robot by Adriansyah, Andi, H. M. Amin, Shamsudin

    Published 2005
    “…The scheme is validated using parameters of MagellanPro mobile robot and tested by simulation using MATLAB/ SIMULINK. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Development of self-learning algorithm for autonomous system utilizing reinforcement learning and unsupervised weightless neural network / Yusman Yusof by Yusof, Yusman

    Published 2019
    “…From the reviews, it is evident that autonomous system is set to handle finite number of encountered states using finite sequences of actions. In order to learn the optimized states-action policy the self-learning algorithm is developed using hybrid AI algorithm by combining unsupervised weightless neural network, which employs AUTOWiSARD and reinforcement learning algorithm, which employs Q-learning. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Shunt active power filter using hybrid fuzzy-proportional and crisp-integral control algorithms for total harmonic distortion improvement by Abdul Rahman, Nor Farahaida

    Published 2016
    “…Additionally, the proposed HFP+CI voltage control algorithm has resulted fastest response time; it is 94% faster than using the Fuzzy-PI voltage control algorithm and 6% faster than using the Crisp-PI voltage control algorithm.Hence, it can be concluded that the proposed algorithms have successfully performed their functions by effectively enhancing the operation of the SAPF.…”
    Get full text
    Get full text
    Thesis
  14. 14

    Improving the exploration strategy of an automated android GUI testing tool based on the Q-Learning algorithm by selecting potential actions by Goh, Kwang Yi, Baharom, Salmi, Din, Jamilah

    Published 2022
    “…We utilise the Q-Learning algorithm to compare actions, including context-based actions, to effectively detect crashes and achieve a higher code coverage.…”
    Get full text
    Get full text
    Article
  15. 15
  16. 16

    Revolutionizing video analytics: a review of action recognition using 3D by Jeddah, Yunusa Mohammed, Hassan Abdalla Hashim, Aisha, Khalifa, Othman Omran, Ibrahim, Adamu Abubakar

    Published 2024
    “…As an interdisciplinary field, the 3D video action recognition model interprets human actions in three-dimensional video data using approaches such as pose-based, volumetric, motionbased, and hybrid methods. 3D video action recognition finds application in surveillance, sports analysis, human-computer interaction, healthcare, robotics, and augmented/virtual reality. …”
    Get full text
    Get full text
    Article
  17. 17

    Compatible pair of nontrivial actions for some cyclic groups of 2-power order by Sahimel Azwal, Sulaiman, Mohd Sham, Mohamad, Yuhani, Yusof, Nor Haniza, Sarmin, Nor Muhainiah, Mohd Ali, Tan, Lit Ken, Tahir, Shah

    Published 2015
    “…Algorithms in Groups, Algorithms and Programming (GAP) software are used to create more examples on selected cases. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18
  19. 19

    A novel deadlock detection algorithm for neighbour replication on grid environment by Noriyani, Mohd Zin

    Published 2012
    “…The NRGDD is compared with Multi-Cycle of Deadlock Detection and Recovery (MC2DR) algorithm based on the time required for both models to detect two deadlock cycles and using different numbers of transactions. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Compatible Pair of Nontrivial Actions for Some Cyclic Groups of 2-Power Order by Sahimel Azwal, Sulaiman, Mohd Sham, Mohamad, Yuhani, Yusof

    Published 2015
    “…This paper gives the some exact number of compatible pairs of actions for some cyclic groups of 2-power order. Some necessary and sufficient number theoretical conditions for a pair of cyclic groups of 2-power order with nontrivial actions act compatibly on each other are used to investigate some properties to find the exact number of compatible pairs of actions. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item