Search Results - (( java implementation learning algorithm ) OR ( using code ((tree algorithm) OR (_ algorithm)) ))

Refine Results
  1. 1

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Using modification of Prim's algorithm and GNU Octave and to solve the multiperiods installation problem by ,, Wamiliana, Usman, Mustofa, ,, Warsono, Daoud, Jamal Ibrahim

    Published 2020
    “…, and that name is chosen because it is like Unix but differs from Unix because it is free and contains no Unix code. Those algorithms were implemented using 300 randomly generated problems. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Partial Binary Tree Network (Pbtn): A New Dynamic Element Matching (Dem) Approach To Current Steering Digital Analog Converter (Dac) by Teh , Choon Yan

    Published 2014
    “…In this research, a new DEM algorithm is proposed on Current-Steering DACs with Partial Binary Tree Network (PBTN) algorithm to overcome glitches transitions with low complexity. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    WA VELET-DCT BASED IMAGE CODER FOR VIDEO CODING APPLICATIONS by GANI, REGINA

    Published 2008
    “…Some recommended areas to be delved for future work on video compression are distributed video coding, ridgelet transform and dual-tree complex wavelet transform.…”
    Get full text
    Get full text
    Final Year Project
  6. 6

    Algorithm optimization and low cost bit-serial architecture design for integer-pixel and sub-pixel motion estimation in H.264/AVC / Mohammad Reza Hosseiny Fatemi by Hosseiny Fatemi, Mohammad Reza

    Published 2012
    “…Regarding the IME of H.264/AVC, we introduce two low cost bit-serial architectures, which are based on full search (FS) algorithm due to its regularity and coding performance. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We extracted 30 different features from network traffic. We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Wearable based-sensor fall detection system using machine learning algorithm by Ishak, Anis Nadia, Habaebi, Mohamed Hadi, Yusoff, Siti Hajar, Islam, Md. Rafiqul

    Published 2021
    “…Then, a Machine Learning Algorithm (MLA) is used to train and test the data before a classifier is used to classify the new incoming dataset. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  10. 10

    Optimal generator matrix G by Harun, Harlisya, Dimyati, Kaharudin, Ungku Chulan, Ungku Azmi Iskandar

    Published 2013
    “…Maximising the minimum determinant is equivalent to obtaining optimal generator matrix G. Instead of using state diagrams, optimal generator matrix G discussed in this paper is obtained using an improved algorithm which is based on Lisya tree structure. …”
    Get full text
    Get full text
    Article
  11. 11

    An Educational Tool Aimed at Learning Metaheuristics by Kader, Md. Abdul, Jamaluddin, Jamal A., Kamal Z., Zamli

    Published 2020
    “…Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment by Ruzita, Ahmad

    Published 2013
    “…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Current Steering Digital Analog Converter (DAC) Using Partial Binary Tree Network (PBTN) by Mohammad Alias, Mohd Azim

    Published 2018
    “…Previous research is able to increase the boundaries of Partial Binary Tree Network (PBTN) to 8-Bits. In this research, DEM algorithm is used, known as Partial Binary Tree Network (PBTN) that been proposed from previous research that aims to push the boundaries of past research from 8-bits to 10-bits. …”
    Get full text
    Get full text
    Monograph
  15. 15
  16. 16
  17. 17

    Analysis & design low power multiplier using TSMC 0.18µm CMOS technology by Norsaifulrudin Mat Zuki

    Published 2008
    “…Low power multipliers are developed through minimizing switching activities of partial product using the radix 4 booth algorithm. Before computation for two input data, the one with a smaller effective dynamic range is processed to generate booth codes, thereby increasing the probability that the partial products become zero. …”
    Get full text
    Learning Object
  18. 18
  19. 19

    Development of a modified adaptive protection scheme using machine learning technique for fault classification in renewable energy penetrated transmission line by Olufemi, Osaji Emmanuel

    Published 2020
    “…The Random Tree standalone ML-AP relay model presented the best performing models from the ML-APS relay model with the best average performance for the correctly classified fault types of 97.61 % at 5 % significance level above other ML algorithms. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Electricity distribution network for low and medium voltages based on evolutionary approach optimization by Hasan, Ihsan Jabbar

    Published 2015
    “…This thesis proposes an algorithm to find the optimum distribution substation placement and sizing by utilizing the PSO algorithm and optimum feeder routing using modified Minimum Spanning Tree (MST). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis