Search Results - (( java implementation learning algorithm ) OR ( using partial matching algorithm ))

Refine Results
  1. 1

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Partial fingerprint recognition using support vector machine by Vijayaprasad, Perumal, Sulaiman, Md. Nasir, Mustapha, Norwati, O. K. Rahmat, Rahmita Wirza

    Published 2010
    “…Global minutiae-based matching algorithm is used to record the matching pairs and their feature vectors are used to generate a model file which is used for classification. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Partial Binary Tree Network (Pbtn): A New Dynamic Element Matching (Dem) Approach To Current Steering Digital Analog Converter (Dac) by Teh , Choon Yan

    Published 2014
    “…Dynamic Element Matching (DEM) is one of the techniques that are commonly used to reduce component mismatch error. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    An Educational Tool Aimed at Learning Metaheuristics by Kader, Md. Abdul, Jamaluddin, Jamal A., Kamal Z., Zamli

    Published 2020
    “…Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment by Ruzita, Ahmad

    Published 2013
    “…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Current Steering Digital Analog Converter (DAC) Using Partial Binary Tree Network (PBTN) by Mohammad Alias, Mohd Azim

    Published 2018
    “…Dynamic Element Matching (DEM) is commonly used to reduce component mismatch error. …”
    Get full text
    Get full text
    Monograph
  9. 9

    A fuzzy case-based reasoning model for software requirements specifications quality assessment by Mostafa S.A., Gunasekaran S.S., Khaleefah S.H., Mustapha A., Jubair M.A., Hassan M.H.

    Published 2023
    “…The fuzzy Logic technique works on the selected nearest cases and it utilizes similarity measurement methods to classify the cases into no-match, partial-match and complete-match cases. The features matching results assist the revised step of the CBR to generate a new solution. …”
    Article
  10. 10

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Doa search and retrieval using N-Gram / Nur Nabilah Abu Mangshor ... [et al.] by Abu Mangshor, Nur Nabilah, Sabri, Nurbaity, Ibrahim, Zaidah, Kasiran, Zolidah, Ahmad, Anis Safura

    Published 2017
    “…There are some search and retrieval applications that require using the exact match of the keyword search with the words stored in the database. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  14. 14

    Document clustering based on inverse document frequency measure by Wan Faridah Hanum, Wan Yaacob

    Published 2005
    “…IDF is easy to understand, has a geometric interpretation, term weighing shown to help clustering, allow partial matching and returns ranked documents. An important finding in this study, where 30 cases of documents tested with the IDF algorithm, and the results are divided into three category; correct cluster, incorrect cluster, and unknown cluster.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Obtaining capillary pressure curves from resistivity measurements in low-permeability sandstone by Saafan, M., Mohyaldinn, M., Elraies, K.

    Published 2023
    “…Afterward, the drainage process is simulated to develop an innovative electrical resistivity model in fully and partially saturated porous media. Next, the genetic algorithm matches laboratory-measured resistivity data and obtains the developed model parameters. …”
    Get full text
    Get full text
    Article
  16. 16

    Plant identification using combination of fuzzy c-means spatial pyramid matching, gist, multi-texton histogram and multiview dictionary learning by Safa, Soodabeh

    Published 2016
    “…Moreover, instead of concatenating feature vectors together and send to classifier, sparse coding and dictionary learning methods are used and instead of considering all features as one view (visual feature), K-SVD algorithm that is one of the famous algorithms for sparse representation is optimized and developed to multi-view model.The experimental results prove that the proposed methods has improved accuracy by 53.77% compared to concatenating features and classic K-SVD dictionary learning model as well.…”
    Get full text
    Get full text
    Thesis
  17. 17

    Associated Factors of Cardiovascular Diseases in Pakistan: Assessment of Path Analyses Using Warp Partial Least Squares Estimation by Mirza Rizwan, Sajid, Noryanti, Muhammad, Roslinazairimah, Zakaria, Shahbaz, Ahmad, Nauman, Ahmad

    Published 2020
    “…The information on demographic, SE, modifiable and clinical factors of CVDs was recorded. Warp partial least squares (PLS) based on warp 3 algorithm was used to estimate the simultaneous linear and non-linear path coefficients of the proposed model of study. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18
  19. 19

    Improved rsync algorithm to minimize communication cost using multi-agent systems for synchronization in multi-learning management systems by Mwinyi, Amir Kombo

    Published 2017
    “…Therefore, the aim of this study is to minimize the computation time during RFS by improving the standard rsync algorithm. Previously, several algorithms and techniques have been proposed for partial file synchronization but many of them were based on controlling the block size, checksums, and delta compression of the matched blocks, to solve the searching problem of the rsync algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Message based random variable length key encryption algorithm. by Mirvaziri, Hamid, Jumari, Kasmiran, Ismail, Mahamod, Mohd Hanapi, Zurina

    Published 2009
    “…Value of random number should be greater than 35 bits and plaintext must be at least 7 bits. A padding algorithm was used for small size messages or big random numbers. …”
    Get full text
    Get full text
    Article