Search Results - (( program learning case algorithm ) OR ( java application model algorithm ))
Search alternatives:
- application model »
- program learning »
- java application »
- model algorithm »
- case algorithm »
- learning case »
-
1
-
2
-
3
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
4
Case Slicing Technique for Feature Selection
Published 2004“…The classification accuracy obtained from the CST method is compared to other selected classification methods such as Value Difference Metric (VDM), Pre-Category Feature Importance (PCF), Cross-Category Feature Importance (CCF), Instance-Based Algorithm (IB4), Decision Tree Algorithms such as Induction of Decision Tree Algorithm (ID3) and Base Learning Algorithm (C4.5), Rough Set methods such as Standard Integer Programming (SIP) and Decision Related Integer Programming (DRIP) and Neural Network methods such as the Multilayer method.…”
Get full text
Get full text
Thesis -
5
Using GA and KMP algorithm to implement an approach to learning through intelligent framework documentation
Published 2023Subjects:Conference paper -
6
Algorithm as a problem solving technique for teaching and learning of the Malay language
Published 2019“…Students are also excited about the algorithmic techniques and the scratch program generated. …”
Get full text
Get full text
Get full text
Proceeding Paper -
7
Algorithm As A Problem Solving Technique For Teaching And Learning Of The Malay Language
Published 2019“…Students are also excited about the algorithmic techniques and the scratch program generated. …”
Get full text
Get full text
Get full text
Article -
8
Algorithm as a problem solving technique for teaching and learning of the Malay language
Published 2019“…Students are also excited about the algorithmic techniques and the scratch program generated. …”
Get full text
Get full text
Get full text
Article -
9
-
10
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
11
Real-time algorithmic music composition application.
Published 2022“…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
12
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
13
-
14
The Development And Evaluation Of Personalized Learning Material Based On A Profiling Algorithm For Polytechnic Students In Learning Algebra
Published 2016“…The solution given by the most similar cases is used as a reference. Prior learning and mathematics learning style are the two parameters of a student's profile. …”
Get full text
Get full text
Thesis -
15
Performances Of Metaheuristic Algorithms In Optimizing Tool Capacity Allocations
Published 2014“…In this research, the algorithms studied includes Genetic Algorithm, Particle Swarm Optimization Algorithm, Differential Evolution Algorithm, Harmony Search Algorithm, Teaching-LearningBased Optimization Algorithm and Black Hole Algorithm. …”
Get full text
Get full text
Thesis -
16
-
17
A Toolkit for Simulation of Desktop Grid Environment
Published 2014“…In this type of environment it is nearly impossible to prove the effectiveness of a scheduling algorithm. Hence the main objective of this study is to develop a desktop grid simulator toolkit for measuring and modeling scheduler algorithm performance. …”
Get full text
Get full text
Final Year Project -
18
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…Among Information Technology graduates, Java programming assignments is an essential part of learning programming as it trains the student to solve programming assignments so that they can improve their programming skills that is useful in their professional life after graduation. …”
Get full text
Get full text
Get full text
Thesis -
19
Secure Image Steganography Using Encryption Algorithm
Published 2016“…The objective of this study is to enhance the confidentiality and security of the image steganography application by combining cryptography algorithm. In this proposed model, the RSA algorithm is used to encrypt a secret message into an unreadable ciphertext before hiding it in the image. …”
Get full text
Get full text
Conference or Workshop Item -
20
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…This thesis describes original research in the field of software quality model by presenting a Feature Ranking Algorithm (FRA) for Pragmatic Quality Factor (PQF) model. …”
Get full text
Get full text
Get full text
Thesis
