Search Results - (( problem solid based algorithm ) OR ( java implementation learning algorithm ))
Search alternatives:
- implementation learning »
- java implementation »
- learning algorithm »
- problem solid »
-
1
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
2
An Educational Tool Aimed at Learning Metaheuristics
Published 2020“…Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
Get full text
Get full text
Get full text
Thesis -
4
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
Get full text
Get full text
Get full text
Thesis -
5
-
6
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
7
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
8
Development of heuristic methods based on genetic algorithm (GA) for solving vehicle routing problem
Published 2008“…One of the applications of VRPSD is in the case of picking up garbage done by solid waste collection company. The computational complexity of most vehicle routing problem and moreover the intricate of stochastic VRP algorithm has made them an important candidate for solution using metaheuristics. …”
Get full text
Get full text
Monograph -
9
Smart Routing For Solid Waste Collection
Published 2023“…This project aims to design and develop a route optimization and decision support system for solid waste collection in Malaysia. The problem of waste management in Malaysia has become increasingly complex due to an increase in waste generation and insufficient technology, manpower, and facilities. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
10
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
11
Role Minimization As An Optimization Metric In Role Mining Algorithms : A Literature Review
Published 2018“…A recent access control model that could accommodate a dynamic structure such as cloud computing can be recognized as role based access control and the role management process of this access control can be identified as role mining.The current trend in role based access control is the role mining problem that can be described as the difficulty to uncover an optimum set of roles from the userpermission assignment.To solve this problem,the researchers have proposed role mining algorithms to produce role set and among the existing algorithms there is an intrinsic topic of the common perception to evaluate the goodness of the generated role set.Eventually,the value of the identified roles could be measured by the preferred metric of optimality namely the number of roles,sizes of userassignment and permission-assignment and Weighted Structural Complexity.Until now, there is some disagreement on the optimization metric but notably many researchers have agreed on the minimization of the number of roles as a solid metric.This paper discusses an overview of the current state-of-the-art on the recent role mining algorithms that focus on role minimization as an optimization metric to evaluate the goodness of the identified roles. …”
Get full text
Get full text
Get full text
Article -
12
Metaheuristic algorithms applied in ANN salinity modelling
Published 2024“…The principal finding here confirms that hybrid-based outperformed four single-based algorithms based on different criteria. …”
Get full text
Get full text
Get full text
Article -
13
Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform
Published 2009Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Recent advances of whale optimization algorithm, its versions and applications
Published 2024“…One of the SI algorithms is called the whale optimization algorithm (WOA). …”
Book chapter -
15
A greedy heuristics multiple criteria model for solving multi-landfill site selection and plant propagation algorithm for improving waste collection vehicle routing solutions
Published 2023“…This research focuses on two solid waste management (SWM) problems, particularly the landfill site selection problem (LSSP) and the waste collection vehicle routing problem (WCVRP). …”
Get full text
Get full text
Get full text
Thesis -
16
-
17
Investigation On Optical Fibre Configurations For Process Tomography
Published 2002“…The response of the sensors was based on two models:- (1) optical attenuation model due to material with differing optical densities, and (2) optical path length model which is used for opaque solids in air or liquid. …”
Get full text
Get full text
Get full text
Article -
18
Characterization of gas-solid two-phase flow by using electrical capacitance tomography
Published 2020“…An iterative method of image reconstruction based on the Landweber algorithm produced the most accurate results for the visualisation of gas-solid distributions in piping systems, and an acceptable time was required to complete the calculation. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
19
Development of improved metaheuristic algorithms for modelling and control of a flexible manipulator system
Published 2019“…The developed algorithms are formulated based on a spiral model approach and a sine model approach. …”
Get full text
Get full text
Research Report -
20
