Search Results - (( java implementation learning algorithm ) OR ( using vector examining algorithm ))

Refine Results
  1. 1

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    An Educational Tool Aimed at Learning Metaheuristics by Kader, Md. Abdul, Jamaluddin, Jamal A., Kamal Z., Zamli

    Published 2020
    “…Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment by Ruzita, Ahmad

    Published 2013
    “…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    Anomaly behavior detection using flexible packet filtering and support vector machine algorithms by Abdul Wahid, Mohammed N.

    Published 2016
    “…A unique method that combines the Flexible Packet Filtering (FPF) with Support Vector Machine (SVM) algorithm is proposed to classify the behavior of the network traffics. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Prediction of hydropower generation via machine learning algorithms at three Gorges Dam, China by Sattar Hanoon M., Najah Ahmed A., Razzaq A., Oudah A.Y., Alkhayyat A., Feng Huang Y., kumar P., El-Shafie A.

    Published 2024
    “…Three different scenarios are examined, such as scenario1 (SC1): used to predict daily power generation, scenario 2 (SC2): used to predict power generation for monthly prediction and scenario 3 (SC3): used to predict hydropower generation (HPG) seasonally. …”
    Article
  10. 10

    Analysis of the dynamics of a vector-borne infection with the effect of imperfect vaccination from a fractional perspective by Tang T.-Q., Jan R., Khurshaid A., Shah Z., Vrinceanu N., Racheriu M.

    Published 2024
    “…To assess the impact of various parameters on the dynamics of chikungunya, we examine solution pathways using the Laplace-Adomian method of disintegration. …”
    Article
  11. 11

    Structured multi-head attention stock index prediction method based adaptive public opinion sentiment vector by Zhao, Cheng, Peng, Zhe, Lan, Xuefeng, Cen, Yuefeng, Wang, Zuxin

    Published 2024
    “…It then analyzes the continuous impact of these vectors on the market through the use of aggregating techniques and public opinion data via a structured multi-head attention mechanism. …”
    Get full text
    Get full text
    Article
  12. 12

    Shot boundary detection based on orthogonal polynomial by Abdulhussain, Sadiq H., Ramli, Abd Rahman, Mahmmod, Basheera M., Saripan, Mohd Iqbal, Al-Haddad, Syed Abdul Rahman, Jassim, Wissam A.

    Published 2019
    “…The proposed algorithm is examined using three well-known datasets which are TRECVID2005, TRECVID2006, and TRECVID2007. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  14. 14

    An analysis of fuzzy clustering algortihms for suggestion of supervisor and examiner of thesis title by Suhaimi, Azrina

    Published 2005
    “…Document is represented using the Vector Space Model. The index terms are then clustered using Fuzzy clustering algorithms based on similarity. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Facial features point localization using modified SIFT scale space / Zulfikri Paidi by Paidi, Zulfikri

    Published 2020
    “…Two databases have been used for examine the image recognition. The databases are CASIA 3D Face V1 and the Bosphorus database. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17
  18. 18

    An evaluation of feature selection technique for dendrite cell algorithm by Mohamad Mohsin, Mohamad Farhan, Hamdan, Abdul Razak, Abu Bakar, Azuraliza

    Published 2014
    “…In this study, six feature selection algorithms namely Information Gain, Gain Ratio, Symmetrical Uncertainties, Chi Square, Support Vector Machine, and Rough Set with Genetic Algorithm Reduct are examined and their effectiveness to represent dendrite cell signal are evaluated. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Comparative study of machine learning algorithms in data classification by Tan, Kai Jun

    Published 2025
    “…Logistic regression, decision trees, k-Nearest Neighbors, Naïve Bayes, support vector machines, and random forest approaches are among the classifiers that were examined. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  20. 20

    State-dependent sliding mode control for three-phase induction motor drives by Fizatul Aini, Patakor

    Published 2014
    “…In this research, the induction motor is controlled by vector control strategy, using indirect field orientation and Space Vector Pulse Width Modulation technique. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis