Search Results - (( java implementation some algorithm ) OR ( knowledge representation _ algorithm ))

Refine Results
  1. 1

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Multi-Agent architecture towards the intelligent strategical algorithm for the representation and retrieval of tacit knowledge from healthcare distributed repositories by Hashmi, Zafar Iqbal, Adwan, Somaia, Hashmi, Faisal

    Published 2006
    “…Knowledge is deemed a key asset in today’s knowledge enriched society and such a ‘Knowledge Age’ has fuelled Knowledge Management discipline to address many complex problem issues pertaining to knowledge creation, procurement, representation, retrieval,capitalization, etc. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Route Optimization System by Zulkifli, Abdul Hayy

    Published 2005
    “…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
    Get full text
    Get full text
    Final Year Project
  5. 5

    Design and Implementation of Data-at-Rest Encryption for Hadoop by Wan Nor Shuhadah, Wan Nik, Mohamad Afendee, Mohamed, Zarina, Mohamad, Siti Hanisah, Kamaruzaman

    Published 2017
    “…It is shown that the implementation of AES encryption algorithm is capable to secure data stored in HDFS to some extent.…”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Design and Implementation of Data-at-Rest Encryption for Hadoop by Wan Nor Shuhadah, Wan Nik, Mohamad Afendee, Mohamed, Zarina, Mohamad, Siti Hanisah, Kamaruzaman

    Published 2017
    “…It is shown that the implementation of AES encryption algorithm is capable to secure data stored in HDFS to some extent.…”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Ball surface representations using partial differential equations by Kherd, Ahmad Saleh Abdullah

    Published 2015
    “…The numerical results obtained on well-known example of data points show that the proposed generalised Ball surfaces algorithm performs better than BCzier surface representation in terms of computation time and minimal surface area. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Fuzzy modeling using Bat Algorithm optimization for classification by Noor Amidah, Ahmad Sultan

    Published 2018
    “…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  10. 10

    Implementation of RIO in UMJaNetSim / Chan Chin We by Chan, Chin We

    Published 2004
    “…In this project, I will do some research on the recent TCP congestion control and avoidance mechanisms and implement one of the mechanisms into the Java Network Simulator (JaNetSim). …”
    Get full text
    Get full text
    Thesis
  11. 11

    Forensic accountants, auditors and fraud capability and competence requirements in the Nigerian public sector by Popoola, Oluwatoyin Muse Johnson

    Published 2014
    “…In addition, knowledge, skills and mindset (forensic accountant and auditor) are significantly and positively related to fraud related problem representation. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Comparison of performances of Jaya Algorithm and Cuckoo Search algorithm using benchmark functions by Ahmed, Mashuk, Nasser, Abdullah B., Kamal Z., Zamli, Heripracoyo, Sulistyo

    Published 2022
    “…This paper aims to compare the performance of two metaheuristic algorithms which are Jaya Algorithm (JA) and Cuckoo Search (CS) using some common benchmark functions. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Ontology-based metabolic pathway prediction using saccharomyces cerevisiae data from genbank, ecocyc and kegg by Zakaria, Yuslina

    Published 2006
    “…Thus, in order to provide better access to relevant knowledge, the knowledge of metabolic pathway should be conceptualized and formalized using appropriate knowledge representation technique. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Optimization Of Two-Dimensional Dual Beam Scanning System Using Genetic Algorithms by Koh, Johnny Siaw Paw

    Published 2008
    “…Also, proposed are the new modifications to existing genetic operator called DPPC (Dynamic Pre-Populated Crossover) together with modification of a simple method of representation, called MLR (Multi-Layered Representation). …”
    Get full text
    Get full text
    Thesis
  16. 16

    Optimized feature construction methods for data summarizations of relational data by Sze, Florence Sia Fui

    Published 2014
    “…DARA transforms the data relational representation into a vector space representation and a clustering process is applied to group the data based on their characteristics similarity. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Assessing the relationships between problem representation, capabilities and task performance fraud risk assessment by Nigerian deposit money banks' fraud investigators by Odukoya, Olusoji Olumide

    Published 2021
    “…Furthermore, knowledge, skills, mind-set and ethics of fraud investigators were significantly positively related to fraud-related problem representation, indicating they are essential requirements for enhancing fraud risk assessment within banks. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Representing semantics of text by acquiring its canonical form by Taiye, Mohammed Ahmed, Kamaruddin, Siti Sakira, Ahmad, Farzana Kabir

    Published 2017
    “…Canonical form is a notion stating that related idea should have the same meaning representation. It is a notion that greatly simplifies task by dealing with a single meaning representation for a wide range of expression. …”
    Get full text
    Get full text
    Article
  19. 19
  20. 20