Search Results - (( java implementation learning algorithm ) OR ( using scale selection algorithm ))

Refine Results
  1. 1

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    An Educational Tool Aimed at Learning Metaheuristics by Kader, Md. Abdul, Jamaluddin, Jamal A., Kamal Z., Zamli

    Published 2020
    “…Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment by Ruzita, Ahmad

    Published 2013
    “…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Sizing optimization of large-scale grid connected photovoltaic system using dolphin echolocation algorithm / Muhammad Zakyizzuddin Rosselan by Rosselan, Muhammad Zakyizzuddin

    Published 2018
    “…Later, an Iterative-based Sizing Algorithm (ISA) was developed to determine the optimal sizing solution which was later used as benchmark for sizing algorithms using optimization methods. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Common spatial pattern with feature scaling (FSc-CSP) for motor imagery classification by Prathama, Y.B.H., Shapiai, M.I., Aris, S.A.M., Ibrahim, Z., Jaafar, J., Fauzi, H.

    Published 2017
    “…Instead of selecting features, the proposed algorithm employs a feature scaling system to scale the importance of each band by using Genetic Algorithm (GA) altogether with Extreme Learning Machine (ELM) as classifier, with 1 signifying the most important bands, declining until 0 for the unused bands, as opposed to the 1 and 0 selection system used in BPSO-CSP. …”
    Get full text
    Get full text
    Article
  8. 8

    A block-based multi-scale background extraction algorithm by Davarpanah, Seyed Hashem, Khalid, Fatimah, Golchin, Maryam

    Published 2010
    “…Conclusion: Using Multi scaling filtering and applying the filters just to some selected nonoverlapped blocks reduce the time consumption of the extracting background algorithm. …”
    Get full text
    Get full text
    Article
  9. 9

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Scaled Conjugate Gradient using strong Wolfe line search for portfolio selection / Nurfatihah Anizan by Anizan, Nurfatihah

    Published 2024
    “…Then, the scaled LAMR method is applied in portfolio selection problems, to determine the more suitable investment between CIMB Bank and Maybank. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Evaluation of feature selection algorithm for android malware detection by Mazlan, Nurul Hidayah, A Hamid, Isredza Rahmi

    Published 2018
    “…The related best features in the sample are selected using weight and priority ranking process. …”
    Get full text
    Article
  12. 12
  13. 13

    Slice sampler and metropolis hastings approaches for bayesian analysis of extreme data by Rostami, Mohammad

    Published 2016
    “…In this research, application of extreme value theory within a Bayesian framework using the Metropolis Hastings algorithm and the slice sampler algorithm as an alternative approach, has been introduced. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    Facial features point localization using modified SIFT scale space / Zulfikri Paidi by Paidi, Zulfikri

    Published 2020
    “…Three tests were used on the original SIFT algorithm and modified SIFT. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Dynamic Robust Bootstrap Algorithm for Linear Model Selection Using Least Trimmed Squares by Uraibi, Hassan Sami

    Published 2009
    “…In this respect, we propose to incorporate our proposed DRBLTS in the bootstrap model selection technique. We also proposed to use an alternative robust location and scale estimates which are less affected by outliers instead of using the classical mean and classical standard deviation. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Feature selection to enhance android malware detection using modified term frequency-inverse document frequency (MTF-IDF) by Mazlan, Nurul Hidayah

    Published 2019
    “…The related best features in the sample are selected using weight and priority ranking process using K-means. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    An Efficient Genetic Algorithm for Large Scale Vehicle Routing Problem Subject to Precedence Constraints by Noraini, Mohd Razali

    Published 2015
    “…In this paper, a new algorithm is developed and the performances as well as the quality of the solution were evaluated against large scale test problems. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  20. 20