Search Results - (( program information extraction algorithm ) OR ( java implementation learning algorithm ))
Search alternatives:
- implementation learning »
- extraction algorithm »
- program information »
- java implementation »
- learning algorithm »
-
1
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
2
Agent-based extraction algorithm for computational problem solving
Published 2015“…The results show that the extraction algorithm has been able to extract 100 % of the information correctly. …”
Get full text
Get full text
Thesis -
3
An Educational Tool Aimed at Learning Metaheuristics
Published 2020“…Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
Get full text
Get full text
Get full text
Thesis -
5
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
Get full text
Get full text
Get full text
Thesis -
6
-
7
Recognition of isolated elements picture using backpropagation neural network / Melati Sabtu
Published 2005“…There are three main programs work together. The programs are back-propagation neural network program, training and performance program and recognition program. …”
Get full text
Get full text
Thesis -
8
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
9
Software Classification Using Structure-Based Descriptors
Published 2009“…This work includes the use of structure information contained in source code programs to automate program classification. …”
Get full text
Get full text
Get full text
Thesis -
10
Pattern extraction for programming performance evaluation using directed apriori
Published 2009Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Classification of students' performance in computer programming course according to learning style
Published 2024Conference Paper -
12
Extracting Object Oriented Software Architecture from C++ Source Code
Published 2000Get full text
Get full text
Thesis -
13
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
14
Data mining using genetic algorithm in finance data / A. Noor Latiffah and A. B. Nordin
Published 2006“…The methods that wilt be applied are conventional statistical methods Markowitz Optimization as well as evolutionary programming (EP) utilizing genetic algorithms. The result of this project are expected to be a comparison of the used methods that will give an indication how well evolutionary programming can perform relative to conventional method and how good the results of the data mining process.…”
Get full text
Get full text
Conference or Workshop Item -
15
Extracting Tweets Using R in The Context of Ethical Issues
Published 2021“…The analysis was carried out with a simple algorithm written in R Programming. 45 keywords based on Ibn Khaldun’s thoughts were constructed as the hashtag to retrieve data from Twitter. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
16
Classification of machine learning engines using latent semantic indexing
Published 2012“…Functional descriptors of each program are identified by extracting terms contained in the source code.In addition, information on where the terms are extracted from is also incorporated in the LSI.Based on the undertaken experiment, the LSI classifier is noted to generate a higher precision and recall compared to the C4.5 algorithm as provided in the Weka tool.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
-
18
Image classification using two dimensional wavelet coefficients with parallel computing
Published 2020“…This research algorithm demonstrated a very promising result with Support Vector Machines, this algorithm produces a 90% of accuracies whereas the decision tree algorithm gets 100% accuracies. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
19
Classification of Students' Performance in Computer Programming Course According to Learning Style
Published 2024“…In Information Technology related programs, computer programming courses are made compulsory subjects in most institutions of learning. …”
Proceedings Paper -
20
Computational problem solving architectural design based on multi-agent.
Published 2013“…The application of problem solving methods is seemed to be difficult for novice students in computer programming field. Hence, majority of them prefer to go straight to the last stage to collect information by analyzing source code. …”
Get full text
Get full text
Get full text
Article
