Search Results - (( java implementation learning algorithm ) OR ( using sector utilizing algorithm ))

Refine Results
  1. 1

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    An Educational Tool Aimed at Learning Metaheuristics by Kader, Md. Abdul, Jamaluddin, Jamal A., Kamal Z., Zamli

    Published 2020
    “…Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment by Ruzita, Ahmad

    Published 2013
    “…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Application and evaluation of the evolutionary algorithms combined with conventional neural network to determine the building energy consumption of the residential sector by Wang G., Mukhtar A., Moayedi H., Khalilpoor N., Tt Q.

    Published 2025
    “…Residential uses a significant amount of energy; hence, encouraging sustainability and lessening environmental effects requires minimizing energy consumption in this sector. …”
    Article
  7. 7

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14

    Diabetes prediction using machine learning / Muhammad Adib Mohd Nazri and Mahfudzah Othman by Mohd Nazri, Muhammad Adib, Othman, Mahfudzah

    Published 2023
    “…Two types of machine learning, supervised and unsupervised, are used to assist patients and the medical sector. The data and results from these methods can be used as references for diagnosis. …”
    Get full text
    Get full text
    Book Section
  15. 15
  16. 16

    Real-time Personal Protective Equipment (PPE) compliance detection system using you only look once version 5 / Nur Amielia Natasha Mohamad Nazli by Mohamad Nazli, Nur Amielia Natasha

    Published 2023
    “…Therefore, the objectives of this project involve design and implementation of a real-time PPE detection system, which aims to effectively monitor workers’ safety compliance. The project utilizes the You Only Look Once (YOLO) algorithm as the detection algorithm, namely version 5. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Optimization of exclusive release policies for hydropower reservoir operation by using genetic algorithm by Tayebiyan, Aida, Mohammed Ali, Thamer Ahmed, Ghazali, Abdul Halim, Abdul Malek, Marlinda

    Published 2016
    “…The efficient utilization of hydropower resources play an important role in the economic sector of power systems, where the hydroelectric plants constitute a significant portion of the installed capacity. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Performance analyses of adaptive handover decision algorithm using spectrum aggregation in long term evolution - advanced network by Usman, I. H., Nordin, N. K., Omizegba, E. E., Sali, A., Rasid, M. F. A., Hashim, F.

    Published 2021
    “…The aspect of spectrum or carrier aggregation uses cognitive radio technology that implements the dynamic spectrum access for spectrum utilization by sensing and using the underutilized spectrum on co-primary basis without interference to the primary users. …”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19
  20. 20

    The framework of inventory prediction model using ABC analysis for inventory management / Umi Safierah Masdiki and Rozita Kadar by Masdiki, Umi Safierah, Kadar, Rozita

    Published 2024
    “…This is particularly beneficial in the business sector, where business intelligence technology is widely utilized for business development. …”
    Get full text
    Get full text
    Get full text
    Article