Search Results - (( java implementation learning algorithm ) OR ( using execution tree algorithm ))
Search alternatives:
- implementation learning »
- java implementation »
- learning algorithm »
- using execution »
- execution tree »
- tree algorithm »
-
1
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
2
-
3
Enhance efficiency of answering XML keyword query using incompact structure of MCCTree
Published 2012“…If the result cannot be used directly by the ranking method, the algorithm has an ineffective process. …”
Get full text
Get full text
Thesis -
4
-
5
An Educational Tool Aimed at Learning Metaheuristics
Published 2020“…Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
Get full text
Get full text
Get full text
Thesis -
7
Disparity map algorithm using hierarchical of bitwise pixel differences and segment-tree from stereo image
Published 2024“…The adaptability of the algorithm is demonstrated through a 3D surface reconstruction using a final disparity map. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
The stopping rules for winsorized tree
Published 2017“…This mechanism is controlled by the proposed algorithm. In winsorized tree, data are screened for identifying outlier.If outlier is detected, the value is neutralized using winsorize approach. …”
Get full text
Get full text
Conference or Workshop Item -
9
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
Get full text
Get full text
Get full text
Thesis -
10
State of charge estimation for lithium-ion battery based on random forests technique with gravitational search algorithm
Published 2023Conference Paper -
11
-
12
Speeding up index construction with GPU for DNA data sequences
Published 2011“…The advancement of technology in scientific community has produced terabytes of biological data.This datum includes DNA sequences.String matching algorithm which is traditionally used to match DNA sequences now takes much longer time to execute because of the large size of DNA data and also the small number of alphabets.To overcome this problem, the indexing methods such as suffix arrays or suffix trees have been introduced.In this study we used suffix arrays as indexing algorithm because it is more applicable, not complex and used less space compared to suffix trees.The parallel method is then introduced to speed up the index construction process. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
An optimized attack tree model for security test case planning and generation
Published 2018“…By leveraging on the optimized attack tree algorithm used in this research work, the threat model produces efficient test plans from which adequate test cases are derived to ensure a secured web application is designed, implemented and deployed. …”
Get full text
Get full text
Article -
14
Algorithm Development of Bidirectional Agglomerative Hierarchical Clustering Using AVL Tree with Visualization
Published 2024thesis::doctoral thesis -
15
Optimizing B-tree search performance of big data sets / Mohsen Marjani
Published 2017“…This study proposes an optimized B-tree search method to improve the execution time of the search tasks and to optimize the performance of the B-tree search process. …”
Get full text
Get full text
Get full text
Thesis -
16
Separator Database and SPM Tree Framework for Mining Sequential Patterns Using Prefixspan with Pseudoprojection
Published 2008“…Moreover,improper management of intermediate databases may adversely affect the execution time and memory utilization. In the present work, Separator Database is proposed to improve PrefixSpan with pseudoprojection through early removal of uneconomical in-memory sequenced database, whilst SPM-Tree framework is proposed to build the intermediated databases. …”
Get full text
Thesis -
17
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
18
Separator Database and SPM Tree Framework for Mining Sequential Patterns Using Prefixspan with Pseudoprojection
Published 2008“…Moreover,improper management of intermediate databases may adversely affect the execution time and memory utilization. In the present work, Separator Database is proposed to improve PrefixSpan with pseudoprojection through early removal of uneconomical in-memory sequenced database, whilst SPM-Tree framework is proposed to build the intermediated databases. …”
Get full text
Get full text
Thesis -
19
Keylogger detection analysis using machine learning algorithm / Muhammad Faiz Hazim Abdul Rahman
Published 2022“…It is intended that this initiative would deliver benefits to all of the users and be useful to them.…”
Get full text
Get full text
Student Project -
20
Sentiment Analysis on Users' Satisfaction for Mobile Banking Apps in Malaysia
Published 2022“…The best accuracy result shows 94.37% by the Decision Tree algorithm, and Naïve Bayes obtained the worst outcome at 66%.…”
Get full text
Get full text
Get full text
Article
