Search Results - (( programming string _ algorithm ) OR ( java application mining algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3
  4. 4

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6
  7. 7

    Evaluation of the effectiveness and efficiency of Wagner and Fischer algorithm in retrieving Hadith translated documents / Kamarul Arifin Muhamad by Muhamad, Kamarul Arifin

    Published 2002
    “…This thesis studies the method of a string-searching algorithm. The studies describe features and methods for string searching and comparison using Wagner and Fischer algorithm. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Mining Sequential Patterns Using I-PrefixSpan by Dhany , Saputra, Rambli Dayang, R.A., Foong, Oi Mean

    Published 2007
    “…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  10. 10
  11. 11
  12. 12

    Simulation of vibrating string by Loo, Twan Guan, Choy, Kam Heng

    Published 2001
    “…This project illustrates the steps involved in the computer simulation of a physical phenomenon by considering the problem of wave propagation in a thin elastic string. A computer program is developed to compute the shape of the string at any time, given any initial shape. …”
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  13. 13
  14. 14

    Employing longest common subsequence method to retrieve translated Al-Quran documents / Muhamad Shamsudin by Shamsudin, Muhamad

    Published 2001
    “…Longest Common Subsequence algorithm (LCS) has been developed to solve string matching problems. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    Word segmentation of output response for sign language devices by Za'bah, Nor Farahidah, Muhammad Nazmi, Ahmad Amierul Asyraf, Azman, Amelia Wong

    Published 2020
    “…The proposed text segmentation method in this work is by using the dynamic programming and back-off algorithm, together with the probability score using word matching with an English language text corpus. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Genetic Mutation of Cowpea as a Constrained Stochastic Optimization Problem in Sustainability by Emmanuel, Okewu, Kehinde, Okewu, Siti Sarah, Maidin, Wong, Ling Shing

    Published 2023
    “…Using series of experiments in Python programming, we applied genetic algorithm to the genetic mutation of cowpea, a tropical leguminous plant and protein-rich crop. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18
  19. 19

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
    Get full text
    Get full text
    Thesis
  20. 20

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique contains three approaches; first approach is string encryption. The string encryption is about adding a mathematical equation with arrays and loops to the strings in the code to hide the meaning. …”
    Get full text
    Get full text
    Thesis