Search Results - (( using application a algorithm ) OR ( java implementation learning algorithm ))

Refine Results
  1. 1

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment by Ruzita, Ahmad

    Published 2013
    “…The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    An Educational Tool Aimed at Learning Metaheuristics by Kader, Md. Abdul, Jamaluddin, Jamal A., Kamal Z., Zamli

    Published 2020
    “…Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…However, the increased security breaches of recent mental health applications that leaked the patient's profile. This project proposed a virtual mental health mobile application, called TalkOut, with a lightweight message encryption algorithm to protect patient's profile, conversation messages and treatment history. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  8. 8

    Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform by Alias, Norma, Satam, Noriza, Abd. Ghaffar, Zarith Safiza, Darwis, Roziha, Hamzah, Norhafiza, Islam, Md. Rajibul

    Published 2009
    “…This paper proposed the NAGE method as a straight forward transformation from sequential to parallel algorithm using domain decomposition and splitting strategies. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We extracted 30 different features from network traffic. We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions by Saraswati, Galuh Wilujeng

    Published 2017
    “…The project has also implemented the optimization process onto the proposed ANFIS model through the hybrid of Genetic Algorithm on the fuzzy membership function of the ANFIS model. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Schelkunoff array synthesis methods using adaptive-iterative algorithm by Abdul Latiff, Nurul Mu'azzah

    Published 2003
    “…Basically, this algorithm is a combination of iterative algorithm with adaptive algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Adaptive interference canceller using analog algorithm with offset voltage by Mohammed, Alaa Hadi

    Published 2015
    “…LMS and NLMS algorithms have been used in a wide range of signal processing applications because of their simplicity in computations compared to the RLS algorithm. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Simulation of shortest path using a-star algorithm / Nurul Hani Nortaja by Nurul Hani , Nortaja

    Published 2004
    “…The steps to calculate a shortest path using Aalgorithm is shown by using appropriate examples and related figures. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Marketplace product recommendation using collaborative filter / Muhammad Alif Fauzan Ismail by Ismail, Muhammad Alif Fauzan

    Published 2021
    “…In conclusion this paper is to develop a product recommender in marketplace mobile application using Collaborative Filter and the accuracy of the algorithm is measured using Mean Absolute Error…”
    Get full text
    Get full text
    Thesis
  15. 15

    Real time nonlinear filtered-x lms algorithm for active noise control by Sahib, Mouayad Abdulredha

    Published 2012
    “…The developed THF-NLFXLMS algorithm is tested by means of simulation and implemented experimentally using FPGA-based real time controller for a nonlinear ANC application. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Enhance key generation algorithm based user string identity as public key by Norhidayah, Muhammad

    Published 2015
    “…This algorithm uses a user’s identity to replace the numbers that are used as a public key in the RSA algorithm. …”
    Get full text
    Get full text
    Thesis
  18. 18

    A Proposed False Report Identification Algorithm for a Mobile Application in the IoT Environment by Rajoo, S, Magalingam, P, Idris, NB, Samy, GN, Maarop, N, Shanmugam, B, Perumal, S

    Published 2024
    “…In this research, a false report identification algorithm for mobile application is developed using a text classification technique. …”
    Proceedings Paper
  19. 19
  20. 20

    Model structure selection for a discrete-time non-linear system using genetic algorithm by Ahmad, Robiah, Jamaluddin , Hishamuddin, Hussain, Mohd. Azlan

    Published 2004
    “…The performance of the proposed algorithm is also compared to the model developed using the orthogonal least squares (OLS) algorithm. …”
    Get full text
    Get full text
    Get full text
    Article