Search Results - (( modification application need algorithm ) OR ( java implementation learning algorithm ))
Search alternatives:
- modification application »
- implementation learning »
- java implementation »
- learning algorithm »
- application need »
- need algorithm »
-
1
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
2
An Educational Tool Aimed at Learning Metaheuristics
Published 2020“…Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
Get full text
Get full text
Get full text
Thesis -
4
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
Get full text
Get full text
Get full text
Thesis -
5
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
6
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
7
Statistical selection algorithm for peer-to-peer system
Published 2008Get full text
Get full text
Get full text
Article -
8
Improvement and performance analysis on statistical selection algorithms
Published 2006Get full text
Get full text
Conference or Workshop Item -
9
Development of optimization Alghorithm for uncertain non-linear dynamical system
Published 2004Get full text
Get full text
Monograph -
10
Development of a cost efficient vision system for defects detection / Muhammad Zarif Kamarudin
Published 2010“…A full programming documentation was done based on programming body modification and improvement. This need to be done due to the fact that further improvement of this project will need the coding history on how the algorithm being developed thus documentation is the common practice in programming stage. …”
Get full text
Get full text
Monograph -
11
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
12
Development of cost efficient vision system for defects detection / Muhammad Zarif Kamarudin
Published 2010“…A full programming documentation was done based on programming body modification and improvement. This need to be done due to the fact that further improvement of this project will need the coding history on how the algorithm being developed thus documentation is the common practice in programming stage. …”
Get full text
Get full text
Thesis -
13
-
14
-
15
ABC: android botnet classification using feature selection and classification algorithms
Published 2017“…Due to the fast modifications in the technologies used by malicious application (app) developers, there is an urgent need for more advanced techniques for Android botnet detection. …”
Get full text
Get full text
Article -
16
Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform
Published 2009Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Solar photovoltaic system based on perturb and observe maximum power point tracking with trapezoidal rule approach under partial shading conditions
Published 2022“…However, P&O suffers from considerable oscillation in the output power, and in the original form, P&O is not capable to perform efficiently under PSC, and needs improvement to be prosperous. Several works proposed different modifications on P&O algorithm to handle the main drawbacks, in addition to combine the P&O algorithm with a soft computing algorithm to track global peak under PSC, which is known as the hybrid approach. …”
Get full text
Get full text
Get full text
Thesis -
18
Modifying iEclat algorithm for infrequent patterns mining
Published 2018“…A few parts of this algorithm need a modification to assure that it is suitable for mining infrequent pattern. …”
Get full text
Get full text
Conference or Workshop Item -
19
Application of adaptive bats sonar algorithm to minimise car side impact design
Published 2017“…This project was focusing on the modification of bats sonar algorithm (BSA) and renamed to adaptive bats sonar algorithm (ABSA) due to some limitations of previous algorithm. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
20
Text encryption using Elliptic Curve Cryptography (ECC) over binary finite field and Elgamal Cryptosyste / Ahmad Asif Bakhtiar Noor Noor Hamid, Nor Syazwani Nor Zailan and Syaza Fa...
Published 2019“…We observed that to implement Elgamal e1yptosystem in binaiy Cmite field, there are a few modification that need to be done to satisfy the properties of bina,y finite field. …”
Get full text
Get full text
Student Project
