Search Results - (( java implementation learning algorithm ) OR ( using integration concept algorithm ))

Refine Results
  1. 1

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    An Educational Tool Aimed at Learning Metaheuristics by Kader, Md. Abdul, Jamaluddin, Jamal A., Kamal Z., Zamli

    Published 2020
    “…Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment by Ruzita, Ahmad

    Published 2013
    “…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8
  9. 9

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  10. 10
  11. 11

    Multi Objective Optimization Using Genetic Algorithm of a Pneumatic Connector by Salaam, H.A., Taha, Z., Tuan Ya, T.

    Published 2018
    “…This study involves multi objective optimization by using genetic algorithm of several possible alternatives for material used in the manufacturing of the pneumatic nipple. …”
    Get full text
    Get full text
    Article
  12. 12

    Hyper-heuristic framework for sequential semi-supervised classification based on core clustering by Adnan, Ahmed, Muhammed, Abdullah, Abd Ghani, Abdul Azim, Abdullah, Azizol, Huyop @ Ayop, Fahrul Hakim

    Published 2020
    “…Hence, the algorithm must overcome the problem of dynamic update in the internal parameters or countering the concept drift. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    The Effectiveness Of Steam Integrated Approach Using Scratch Module On Achievement And Computational Thinking In Learning Electricity Concepts by Tan, Wee Ling

    Published 2022
    “…The five subconstructs CT was algorithmic thinking, cooperativity, creativity, critical thinking and problem solving. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Multi objective optimization using genetic algorithm of a pneumatic connector by H. A., Salaam, Zahari, Taha, T. M. Y. S., Tuan Ya

    Published 2018
    “…This study involves multi objective optimization by using genetic algorithm of several possible alternatives for material used in the manufacturing of the pneumatic nipple.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15
  16. 16
  17. 17

    WBEC: A web browsers evidence collection toolkit for web browsers usage in Windows 10 by Rayman, Dafiqah Mior, Asmawi, Aziah, Mohd Ariffin, Noor Afiza

    Published 2022
    “…In addition, the SHA-1 hashing algorithm was used to improve the evidence's integrity. …”
    Get full text
    Get full text
    Article
  18. 18
  19. 19

    Ant colony algorithm for text classification in multicore-multithread environment / Ahmad Nazmi Fadzal by Fadzal, Ahmad Nazmi

    Published 2017
    “…Ant Colony Optimization (ACO) is a bio-inspired technique that was introduced to solve Non-Polynomial hard problem of high text data dimension that is similar to Traveling Salesman Problem (TSP) using probabilistic way. Pheromone concept is the main criterion that distinguish ACO to other algorithms. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Integration of enchanced jump point search (JPS) algorithm with modified bresenham technique for path planning in virtual grid-based environment by Nurul Atikah Janis

    Published 2018
    “…The second approach is the modification of heuristic computation using original A* and modified Bresenham. Bresenham Line Algorithm is a line generation algorithm using integer arithmetic where the points (x1, y1) and (x2, y2) are assumed not equal and integer valued. …”
    Get full text
    Get full text
    Get full text
    Thesis