Search Results - (( java implementation learning algorithm ) OR ( using end process algorithm ))

Refine Results
  1. 1

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    An Educational Tool Aimed at Learning Metaheuristics by Kader, Md. Abdul, Jamaluddin, Jamal A., Kamal Z., Zamli

    Published 2020
    “…Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment by Ruzita, Ahmad

    Published 2013
    “…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Optimization of micro-end milling process parameters of titanium alloy using non-dominated sorting genetic algorithm by Golshan, Abolfazl

    Published 2013
    “…Finally, non-dominated sorting genetic algorithm-II as evolutionary optimization approach was used for multi-objective optimization of the micro-end milling process. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Multi-objectives process optimization in end milling process of aluminium alloy 6061-T6 using genetic algorithm by W., Safiei, Rahman, M. M., M.Y., Ali

    Published 2024
    “…The optimization process parameters of end milling were obtained using response surface methodology, mathematical models and the MOGA-II approach. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
    Get full text
    Get full text
    Thesis
  8. 8

    loformation Retrieval - using Porter Stemming Algorithm by Zulkifly, Zurida Azita

    Published 2006
    “…Stemming is a process of removing or transforming endings (suffixes) when they are found on a word; inflectional endings (-s, -ing, -ed, etc) and derivational endings (-ion, - ative, -ity, -ment, -less, etc) and prefixes (un-, in-, etc). …”
    Get full text
    Get full text
    Final Year Project
  9. 9

    A Continuous Overlay Path Probing Algorithm For Overlay Networks by Feily, Maryam

    Published 2013
    “…Several experiments were carried out using the OMNeT++ simulation framework. The designed algorithm was evaluated using experimental data. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Delay and energy-aware routing for efficient data collection in wireless sensor networks / Ihsan Ali by Ihsan , Ali

    Published 2024
    “…The main objectives are to identify optimally reliable nodes and perform effective data scheduling in WSNs, thereby maximizing throughput, minimizing energy consumption, and reducing end-to-end delay. The AFW algorithm reduces unnecessary computations by focusing only on useful edge entries in the graph, thereby expediting the optimization process. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Artificial bee colony in optimizing process parameters of surface roughness in end milling and abrasive waterjet machining by Norfadzlan, Bin Yusup

    Published 2012
    “…This research develops an optimization algorithm using artificial bee colony (ABC) algorithm to optimize the process parameters that will lead to minimum surface roughness (Ra) value for both end miling and abrasive waterjet machining. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  13. 13

    An enhanced cluster head selection algorithm for routing in mobile AD-HOC network by Abdulsaheb, Ghaida Muttasher

    Published 2017
    “…The results show that the ECRP algorithms is more stable and effective than existing solutions as shown in the final trust scores for throughput, packet delivery ratio, end to end delay, number of dropped packets, and normalized control overhead. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Back end process yield improvement by verification of seeder bulk erase quality for 3.5" reowrk hard disk drive by Saidin, Mohamad Fadli

    Published 2014
    “…With failed drives filtered from going to filler station using the enhanced algorithm in the HOS production software, yield improvement at back end process achieved around two percent.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  16. 16
  17. 17

    The optimization inventory process on identical machine job shop with multiple setups using genetic algorithm by Abd Rahman, Md Nizam, Irwan, Hery, Ebrahim, Zuhriah, Leuveano, Raden Achmad Chairdino, Dzakiyullah, Nur Rachman

    Published 2024
    “…In flow shop scheduling, inventory typically accumulates at the beginning and end of the process (finished goods). In contrast, in job shop scheduling, inventory not only appears at the start and end of each process but also during the middle of the machine process. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Cutting temperature and surface roughness optimization in CNC end milling using multi objective genetic algorithm by Al Hazza, Muataz, Adesta, Erry Yulian Triblas, Superianto, M. Y., Riza, Muhammad

    Published 2012
    “…Thus, developing a model for estimating the cutting parameters and optimizing this model to minimize the cutting temperatures and surface roughness becomes utmost important to avoid any damage to the quality surface.This paper presents the development of new models and optimizing these models of machining parameters to minimize the cutting temperature in end milling process by integrating the genetic algorithm (GA) with the statistical approach. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  19. 19

    Parallel Processing of RSAAlgorithm Using MPI Library by Wan Dagang, Wan Rahaya

    Published 2006
    “…This report explains the project of developing Parallel Processing of RSA Algorithm Using MPI Library. RSA Algorithm is a public-key cryptosystem that offers encryption technique which security is based on the difficulty of factoring large prime integers. …”
    Get full text
    Get full text
    Final Year Project
  20. 20

    Visual servo algorithm of robot arm for pick and place application by Chuah, Zuo Wei, Mohd Hairi Mohd Zaman, Mohd Faisal Ibrahim

    Published 2024
    “…Electrical motors are frequently used to move each robot arm joint. An end-effector that can move freely in space is usually attached to one end of the robot platform, which is fixed. …”
    Get full text
    Get full text
    Get full text
    Article