Search Results - (( java implementation learning algorithm ) OR ( using scheme based algorithm ))

Refine Results
  1. 1

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    An Educational Tool Aimed at Learning Metaheuristics by Kader, Md. Abdul, Jamaluddin, Jamal A., Kamal Z., Zamli

    Published 2020
    “…Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment by Ruzita, Ahmad

    Published 2013
    “…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6
  7. 7

    Quality of service management algorithms in WiMAX networks by Saidu, Ibrahim

    Published 2015
    “…This scheme determines an admission criteria based on scheduling service classes. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Prediction and multi-criteria-based schemes for seamless handover mechanism in mobile WiMAX networks by Mubarak, Mohammed Awadh Ahmed Ben

    Published 2013
    “…In the proposed HATSC scheme, the AHP method is uese for criteria weighting, while the TOPSIS method uses for the selection technique based on a multi-criteria decision-making algorithm is proposed. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Summary of best efficient algorithms on cognitive radio cooperative spectrum sensing to improve QoS by Akbari, M., Reza, A.W., Noordin, K.A., Manesh, M.R., Hindia, M.N.

    Published 2014
    “…In addition, the ICA-based scheme also indicates promising convergence and time running performance as compared to other schemes.…”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Secure Hybrid Scheme For Securing Mqtt Protocol Based On Enhanced Symmetric Algorithm by Hintaw, Ahmed Jameel

    Published 2023
    “…A secure hybrid scheme introduces a new design architecture of the symmetric AES algorithm to encrypt the MQTT payload called “D-AES”. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Application Of Higher Order Compact Finite Difference Methods To Problems In Fluid Dynamics by Yap, Wen Jiun

    Published 2003
    “…Third, only the numerical algorithm based on Hermitian scheme is used to solve the flow past a backward-facing step. …”
    Get full text
    Get full text
    Thesis
  12. 12

    A reinforcement learning-based energy-efficient spectrum-aware clustering algorithm for cognitive radio wireless sensor network by Mustapha, Ibrahim

    Published 2016
    “…Performance comparisons of the RL based clustering scheme with Groupwise spectrum-aware clustering scheme show that an energy savings of9% and PU detection performance improvement of 11.6% can be achieved. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Adaptive differential evolution algorithm with fitness based selection of parameters and mutation strategies / Rawaa Dawoud Hassan Al-Dabbagh by Rawaa Dawoud Hassan, Al-Dabbagh

    Published 2015
    “…ARDE algorithm makes use of JADE strategy and the MDE_pBX parameters adaptive schemes as frameworks. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Secure and Efficient Distributed Relay-Based Rekeying Algorithm for Group Communication in Mobile Multihop Relay Network by Adnan, Shahid Khan

    Published 2014
    “…The forward and backward secrecy of the proposed scheme has been extensively validated by formal method using rank theorem. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Post quantum signature schemes for the block chain technology by Wu, Zi Feng

    Published 2019
    “…First we study the different properties and uses of signature schemes, and how Elliptic Curve Digital Signature Algorithm is used in the blockchain technology. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  17. 17

    Mobility management schemes based on multiple criteria for optimization of seamless handover in long term evolution networks by Hussein, Yassein Soubhi

    Published 2014
    “…The second scheme is cell selection based on multiple criteria decision making (MCDM) approach. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Differential evolution based special protection and control scheme for contingency monitoring of transmission line overloading by Hadi, Mahmood Khalid, Othman, Mohammad Lutfi, Abdul Wahab, Noor Izzri

    Published 2017
    “…In this paper, a Special Protection and Control Scheme (SPCS) based on Differential Evolution (DE) algorithm for optimal generation rescheduling to mitigate line overloads in contingency conditions has been presented. …”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Active force control with iterative learning control algorithm for a vehicle suspension by Rosmazi, Rosli

    Published 2013
    “…ILC algorithm is implemented into AFC-based control scheme to reduce its complexity and hence faster response, by replacing the use of artificial intelligence (Al) method as proposed by previous researcher. …”
    Get full text
    Get full text
    Thesis
  20. 20

    An enhanced color image encryption algorithm using LT-PRNG by Mohammed Ismael, Saba

    Published 2018
    “…Only the authorized receiver can decrypt the ciphertext with the secret key(s) to obtain the plaintext. Several chaos-based image encryption algorithms use low-dimension chaos as the encryption tools. …”
    Get full text
    Get full text
    Thesis