Search Results - (( java information source algorithm ) OR ( program segmentation learning algorithm ))

Refine Results
  1. 1

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Accuracy of advanced deep learning with tensorflow and keras for classifying teeth developmental stages in digital panoramic imaging by Norhasmira, Mohammad, Anuar Mikdad, Muad, Rohana, Ahmad, Mohd Yusmiaidil, Putera Mohd Yusof

    Published 2022
    “…Background: This study aims to propose the combinations of image processing and machine learning model to segment the maturity development of the mandibular premolars using a Keras-based deep learning convolutional neural networks (DCNN) model. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    STATISTICAL FEATURE LEARNING THROUGH ENHANCED DELAUNAY CLUSTERING AND ENSEMBLE CLASSIFIERS FOR SKIN LESION SEGMENTATION AND CLASSIFICATION by Adil H., Khan, Dayang Nurfatimah, Awang Iskandar, Jawad F., Al-Asad, SAMIR, EL-NAKLA, SADIQ A., ALHUWAIDI

    Published 2021
    “…A profound algorithm comprising of preprocessing in CIELAB color space and Delaunay triangulation based clustering along with Particle Swarm Optimization (PSO) is proposed for the segmentation. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Fostering motivation in TVET students: the role of learner-paced segments and computational thinking in digital video learning by Wan Nor Ashiqin Wan Ali, Wan Ahmad Jaafar Wan Yahaya, Syed Zulkarnain Syed Idrus, Mohd Noorul Fakhri Yaacob

    Published 2024
    “…This study aims to address this gap by examining how learner-paced predefined segments and CT algorithmic thinking can impact TVET students' perceived motivation. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6
  7. 7

    Recognition of isolated elements picture using backpropagation neural network / Melati Sabtu by Sabtu, Melati

    Published 2005
    “…There are three main programs work together. The programs are back-propagation neural network program, training and performance program and recognition program. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…An attacker can easily reconstruct source code from such intermediate formats to extract sensitive information such as proprietary algorithms present in the software. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    A review on sentiment analysis model Chinese Weibo text by Dawei Wang, Rayner Alfred

    Published 2020
    “…For traditional machine learning, there are 2 mainly aspects of innovation: Simultaneous classifier (Adoboost+SVM) and Improvement of classical classification algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceedings
  11. 11
  12. 12

    Constrained clustering approach to aid in remodularisation of object-oriented software systems / Chong Chun Yong by Chong, Chun Yong

    Published 2016
    “…Apart from the explicit clustering constraints from domain experts, other sources of information to guide and improve clustering results can be derived implicitly from the source code itself. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14
  15. 15
  16. 16

    Leaf condition analysis using convolutional neural network and vision transformer by Yong, Wai Chun, Ng, Kok Why, Haw, Su Cheng, Naveen, Palanichamy, Ng, Seng Beng

    Published 2024
    “…Through the use of a hybrid deep learning model that combines vision transformer and convolutional neural networks for classification, the algorithm can be optimized. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18
  19. 19

    Ump Intelligent Chatbot Using Dialogflow by Joachim, Agostain

    Published 2022
    “…To create such a chatbot, a machine learning algorithm is used to learn the human language that is mainly used during such conversations. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  20. 20

    SecPath: Energy efficient path reconstruction in wireless sensor network using iterative smoothing by Abd, Wamidh Jwdat

    Published 2019
    “…To achieve energy efficiency, it compresses the packet information by using GZIP tools in JAVA. SecPath is evaluated with several variations using 400 nodes in WSN deployments as well as large-scale simulations. …”
    Get full text
    Get full text
    Thesis