Search Results - (( java implementation learning algorithm ) OR ( using factor drops algorithm ))

Refine Results
  1. 1

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    An Educational Tool Aimed at Learning Metaheuristics by Kader, Md. Abdul, Jamaluddin, Jamal A., Kamal Z., Zamli

    Published 2020
    “…Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment by Ruzita, Ahmad

    Published 2013
    “…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Neighbour-based on-demand routing algorithms for mobile ad hoc networks by Ejmaa, Ali Mohamed E.

    Published 2017
    “…In addition, with regard to the second algorithm SNBR, the results show that SNBR overcomes the NCPR algorithm terms of normalize routing overhead by 58.80% as its due to its dropping factor. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Dynamic point stochastic rounding algorithm for limited precision arithmetic in Deep Belief Network training by Essam, M., Tang, T.B., Ho, E.T.W., Chen, H.

    Published 2017
    “…We show that by using a variable scaling factor, the fixed-point parameter updates are enhanced. …”
    Get full text
    Get full text
    Article
  9. 9

    Towards enhanced remaining useful life prediction of lithium-ion batteries with uncertainty using optimized deep learning algorithm by Reza M.S., Hannan M.A., Mansor M., Ker P.J., Rahman S.A., Jang G., Mahlia T.M.I.

    Published 2025
    “…Moreover, the LSA optimization technique is introduced to optimally determine the LSTM deep neural model hyperparameters including the number of hidden neurons, learn rate, epoch, learn rate drop factor, learn rate drop period, and gradient decay factor. …”
    Article
  10. 10

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  11. 11
  12. 12

    Performance enhancement of adaptive cluster formation and routing protocols in wireless networks by Khalaf, Osamah Ibrahem

    Published 2017
    “…This thesis describes an analysis on the effect of these challenges on the perceived video quality over MANET which is considered the important network in many studies. An enhanced algorithm has been suggested to improve the video quality using routing algorithm which is used to transfer the data packets with minimum number of errors. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    DEVELOPMENT OF NODE RELIABILITY DETECTION ALGORITHM FOR WIRELESS SENSOR NETWORKS by AZMAN, MOHAMAD AFIQ

    Published 2014
    “…The failure of sensor nodes can be affected by certain factors such as battery drop, interference of signal and malfunction of device. …”
    Get full text
    Get full text
    Final Year Project
  14. 14

    DEVELOPMENT OF NODE RELIABILITY DETECTION ALGORITHM FOR WIRELESS SENSOR NETWORKS by AZMAN, MOHAMAD AFIQ

    Published 2014
    “…The failure of sensor nodes can be affected by certain factors such as battery drop, interference of signal and malfunction of device. …”
    Get full text
    Get full text
    Final Year Project
  15. 15

    Fair bandwidth distribution marking and scheduling algorithm in network traffic classification by Al-Kharasani, Ameen Mohammed Abdulkarem

    Published 2019
    “…Finally, propose a new method of obtaining optimal parameters dropping functions for Random Early Detection (RED) algorithm. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Automated traffic counting data collection and analysis by Low, Anand Hong Ren

    Published 2021
    “…The factors affecting the performance of the algorithm is discussed. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  17. 17
  18. 18

    The Use of Artificial Neural Networks and Genetic Algorithms for Effectively Optimizing Production from Multiphase Flow Wells by Ayoub, Mohammed Abdalla

    Published 2010
    “…Moreover, the output from the ANNs will be utilized plus selected other input parameters as controlling variables for optimizing the production from a multiphase producing field using Genetic Algorithms (GA).…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Comparison of algorithm Support Vector Machine and C4.5 for identification of pests and diseases in chili plants by M, Irfan, N, Lukman, A. A, Alfauzi, J, Jumadi

    Published 2019
    “…The use of data mining algorithms is expected to help in the identification of pests and diseases in chili plants. …”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    TDMA scheduling analysis of energy consumption for iot wireless sensor network by Islam, Md Ashikul

    Published 2019
    “…The algorithm use time division multiplexing algorithm together with hello message to allocate the neighbors and their energy level to find the best way to communicate and reduce packet drop, less signal interference and increase throughput. …”
    Get full text
    Get full text
    Thesis