Search Results - (( java implementation learning algorithm ) OR ( using problems faces algorithm ))

Refine Results
  1. 1

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    An Educational Tool Aimed at Learning Metaheuristics by Kader, Md. Abdul, Jamaluddin, Jamal A., Kamal Z., Zamli

    Published 2020
    “…Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment by Ruzita, Ahmad

    Published 2013
    “…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Application of genetic algorithm methods to optimize flowshop sequencing problem by Mohd Fadil, Md Sairi

    Published 2008
    “…This project will focusing on the method used to solve an optimization problem, the limitation of the method used and the results of solving flow shop sequencing problem using genetic algorithm method. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  7. 7

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Student-supervisor matching using stable marriage algorithm / Siti Farahana Nodzari by Nodzari, Siti Farahana

    Published 2007
    “…So, the problem face by students to find supervisor can be solve by using this system. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Face recognition using integrated discrete cosine transform and kernel fisher discriminant analysis by Janahiraman T.V., Omar J., Farukh H.N.

    Published 2023
    “…Moreover, FLD is a linear algorithm by nature. Hence, it fails to extract important information from nonlinear and complex data such as face image. …”
    Conference paper
  11. 11

    Integrated face detection approach for far image application by Salka, Tanko Daniel

    Published 2016
    “…Therefore, the need of a robust and efficient face detection algorithm is required to tackle these problems. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    School teacher-subject allocation management system by Yap, Dennis Jian Yuan

    Published 2024
    “…Not just that, Genetic Algorithm, a meta-heuristic is also used to solve the clashing problem faced by existing system using deterministic algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  14. 14
  15. 15
  16. 16

    Hybrid evolutionary optimization algorithms: A case study in manufacturing industry by Vasant, P.

    Published 2014
    “…This membership function is applied for its useful performance through industrial production problems by employing hybrid evolutionary optimization algorithms. …”
    Get full text
    Get full text
    Book
  17. 17

    Cryptography: A New Approach of Classical Hill Cipher by Abdul Rahman, Mohd Nordin, Yusof, Mohd Kamir, Abidin @ Bharun, Ahmad Faisal Amri, Mohamad Usop, Nor Surayati

    Published 2013
    “…Nevertheless, these enhanced Hill cipher algorithms still face the non invertible key matrix problem. …”
    Get full text
    Get full text
    Article
  18. 18

    Use of experiment design methods to determine unseen data in face recognition problems by Abdullah, Shahrum Shah, Mohd. Hashim, Abdul Wahab Ishari, A. Aziz, Khairul Azha

    Published 2009
    “…Face and non-face data will be used for training the RBF network in order for the network to discriminate face and non-face images. …”
    Get full text
    Get full text
    Monograph
  19. 19

    Modified least trimmed squares method for face recognition / Nur Azimah Abdul Rahim by Abdul Rahim, Nur Azimah

    Published 2018
    “…For most face recognition algorithms, partial occlusions affect the performance of the algorithm. …”
    Get full text
    Get full text
    Thesis
  20. 20

    A feature-based approach for segmenting faces by Zaqout, I., Zainuddin, R., Baba, S.

    Published 2004
    “…The algorithm detects feature points from the image and groups them into face candidates using geometric and grey level constraints. …”
    Get full text
    Get full text
    Article