Search Results - (( tree visualization design algorithm ) OR ( java implementation learning algorithm ))

Refine Results
  1. 1

    BMTutor research design: Malay sentence parse tree visualization by Muhamad Noor, Yusnita, Jamaludin, Zulikha

    Published 2014
    “…As a result of the lack of models and algorithms have been introduced in both parsers, the model and algorithm development phase is introduced in the design of BMTutor.Output from the development process shows that the prototype is able to provide sentence correction for all 15 invalid sentences and can produce parse tree visualizations for all 20 sentences used for prototype testing.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Fast clock tree generation using exact zero skew clock routing algorithm by Reaz, Mamun Ibn, Ibrahimy, Muhammad Ibn, Amin, Nowshad

    Published 2009
    “…A Zero Skew clock routing methodology has been developed to help design team speed up their clock tree generation process. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Parse tree visualization for Malay sentence (BMTutor) by Muhamad Noor, Yusnita, Jamaludin, Zulikha

    Published 2015
    “…It is also to enhance the learning process in BM that can be used by communities, especially students. An algorithm in designing BMTutor is discussed in this paper.The algorithm of the software is done sequentially as followed: 1) tokenizing 2) checking the number of words, 3) searching and comparing process to check the spelling or conjunctions, 4) assigning each word with a certain word class, 5) matching with rules, and 6) delivering/producing output (sentence correction or parse tree visualization, word attribute components, and parse tree from sentence examples).Based on the testing conducted, output from the development process shows that the prototype can correct all 15 invalid sentences and can produce parse tree visualization for all 20 sentences.…”
    Get full text
    Get full text
    Get full text
    Article
  5. 5
  6. 6

    Visualisasi pohon sintaksis berasaskan model dan algoritma sintaks ayat bahasa Melayu by Yusnita, Muhamad Noor

    Published 2018
    “…Previous works that produce syntactic tree output has disregarded additional relevant components such as sentence checking, sentence correction, the syntax tree visualization and the words attributes of each sentence. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Development of a Prediction Algorithm using Boosted Decision Trees for Earlier Diagnoses on Obstructive Sleep Apnea by Sim, Doreen Ying Ying

    Published 2018
    “…This research develops a knowledge-based system by using computational intelligent approaches based on Boosting algorithms on decision trees augmented by pruning techniques and Association Rule Mining. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Zero skew clock routing for fast clock tree generation by Reaz, Mamun Ibn, Amin, Nowshad, Ibrahimy, Muhammad Ibn, Mohamad-Yasin, F., Mohammad, A.

    Published 2008
    “…A Zero Skew Clock Routing Methodology has been developed to help design team speed up their clock tree generation process. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  10. 10

    An Educational Tool Aimed at Learning Metaheuristics by Kader, Md. Abdul, Jamaluddin, Jamal A., Kamal Z., Zamli

    Published 2020
    “…Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment by Ruzita, Ahmad

    Published 2013
    “…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    The comparison of interactive 3D visualization between static and animated approaches for learning binary tree topic / Mohd Zulhisam Yaakub by Yaakub, Mohd Zulhisam

    Published 2016
    “…The purpose of this study is to compare score performance of students enrolled in a binary tree lesson using two types o f 3D visualization approaches in CAI which are 3D static and 3D animated. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Using modification of Prim's algorithm and GNU Octave and to solve the multiperiods installation problem by ,, Wamiliana, Usman, Mustofa, ,, Warsono, Daoud, Jamal Ibrahim

    Published 2020
    “…The Minimum Spanning Tree (MST) is one of the famous problems that is used mostly as the backbone in many network design problems. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    Enhancement of medical image compression algorithm in noisy WLANS transmission by Algaet, Mustafa Almahdi

    Published 2018
    “…For image reconstruction,decoding steps based the developed quantization architecture are examined.The EICA is particularly useful where the size of the transmitted data needs to be reduced to minimize the image transmission time.For data compression with suitable and effective performance,enhanced independent components analysis (EICA) is proposed as an algorithm for compression and decompression of medical data.A comparative analysis is performed based on existing data compression techniques:discrete cosine transform (DCT), set partitioning in hierarchical trees (SPIHT),and Joint Photographic Experts Group (JPEG 2000).Three main modules,namely,compression segment (CS),transceiver segment (TRS),and outcome segment (OTS) modules,are developed to realize a fully computerized simulation tool for medical data compression with suitable and effective performance.To compress medical data using algorithms,CS module involves four different approaches which are DCT, SPIHT,JPEG 2000 and EICA.TRS module is processed by low-cost WLANs with low-bandwidth transmission.Finally,OTS is used for data decompression and visualization result.In terms of compression module,results show the benefits of applying EICA in medical data compression and transmission.While for system design,the developed system displays favorable outcomes in compressing and transmitting medical data.In conclusion,all three modules (CS,TRS,and OTS) are integrated to yield a computerized prototype named as Medical Data Simulation System(Medata-SIM) computerized system that includes medical data compression and transceiver for visualization to aid medical practitioners in carrying out rapid diagnoses.…”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  20. 20