Search Results - (( java implementation learning algorithm ) OR ( using deep graph algorithm ))

Refine Results
  1. 1

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    CAGDEEP : Mobile malware analysis using force atlas 2 with strong gravity call graph and deep learning by Nur Khairani, Kamarudin, Ahmad Firdaus, Zainal Abidin, Azlee, Zabidi, Mohd Faizal, Ab Razak

    Published 2023
    “…To leverage the existing static analysis techniques, this study proposes CAGDeep, to reflect deep semantic information of malware samples. The novelty of our study lies in the Force Atlas 2 call graph development to capture malware behavior patterns. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Development of deep reinforcement learning based resource allocation techniques in cloud radio access network by Amjad, Iqbal

    Published 2022
    “…A step towards long network performance optimization is theterm use of deep reinforcement learning (DRL), which can learn the best policy via interaction with the environment. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  4. 4

    An Educational Tool Aimed at Learning Metaheuristics by Kader, Md. Abdul, Jamaluddin, Jamal A., Kamal Z., Zamli

    Published 2020
    “…Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment by Ruzita, Ahmad

    Published 2013
    “…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Visual Crowd Counting System Using Deep Learning by Mohd Wafi Nazrul Adam, Mohd Ridhwan Oxley Adam

    Published 2021
    “…The model will be trained using the Mall Dataset and the Adam optimization algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  9. 9

    Enhancement of text representation for Indonesian document summarization with deep sequential pattern mining by Dian Sa’adillah Maylawati

    Published 2023
    “…First, this study combines SPM with Sentence Scoring method as feature-based approach and Bellman-Ford algorithm as graph-based to validate the performance of SPM. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Drone-based surveillance of palm tress ecosystems by Mansor, Ya’akob, Baki, Sharudin Omar, Sahwee, Zulhilmy, Mengyue, Cheng, Wu, Yuanyuan

    Published 2024
    “…This paper presents a novel surveillance system designed to identify the health status of oil palm trees by leveraging MATLAB object detection and deep learning techniques. The study aims to improve the accuracy and efficiency of palm health detection by integrating MATLAB's initial object recognition with advanced deep learning algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
    Get full text
    Get full text
    Thesis
  12. 12

    DISCRIMINATING SEDIMENT AND CLEAR WATER OVER CAOSTAL WATER USING GD TECHNIQUE by Mat Amin, Abd Rahman, Ahmad, Fadhli, Abdullah, Khiruddin

    Published 2017
    “…Currently two algorithms are being used routinely by the MODIS Atmosphere and Ocean Team in order to distinguish sediment influence and clear water pixels over turbid water area. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Wearables-assisted smart health monitoring for sleep quality prediction using optimal deep learning by Hamza, Manar Ahmed, Hassan Abdalla Hashim, Aisha, Alsolai, Hadeel, Gaddah, Abdulbaset, Othman, Mahmoud, Yaseen, Ishfaq, Rizwanullah, Mohammed, Zamani, Abu Sarwar

    Published 2023
    “…For sleep quality prediction, the WSHMSQP-ODL model uses the deep belief network (DBN) model. To enhance the sleep quality prediction performance of the DBN model, the enhanced seagull optimization (ESGO) algorithm is used for hyperparameter tuning. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Revolutionizing video analytics: a review of action recognition using 3D by Jeddah, Yunusa Mohammed, Hassan Abdalla Hashim, Aisha, Khalifa, Othman Omran, Ibrahim, Adamu Abubakar

    Published 2024
    “…It also addresses the practicalities of implementing action recognition algorithms in real-world situations, which include tools like deep learning frameworks, pre-trained models, open-source libraries, cloud services, GPU acceleration, and evaluation metrics. …”
    Get full text
    Get full text
    Article
  16. 16

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  17. 17
  18. 18

    Leaf condition analysis using convolutional neural network and vision transformer by Yong, Wai Chun, Ng, Kok Why, Haw, Su Cheng, Naveen, Palanichamy, Ng, Seng Beng

    Published 2024
    “…Through the use of a hybrid deep learning model that combines vision transformer and convolutional neural networks for classification, the algorithm can be optimized. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19
  20. 20

    Enhancement of network security by use machine learning by Hasan, Ahmed Raheem

    Published 2019
    “…From the analysis in the simulation results, one can see that the ANNDL is the best algorithm of machine learning process. This method uses many layers to compute or process the data. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis