Search Results - (( write classification learning algorithm ) OR ( java implementation some algorithm ))*

Refine Results
  1. 1

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Classification of breast cancer disease using bagging fuzzy-id3 algorithm based on fuzzydbd by Nur Farahaina, Idris

    Published 2022
    “…One of the most powerful machine learning methods to handle classification problems is the decision tree. …”
    Get full text
    Get full text
    Thesis
  4. 4

    An ensemble learning method for spam email detection system based on metaheuristic algorithms by Behjat, Amir Rajabi

    Published 2015
    “…Recently, various techniques based on different algorithms have been developed. However, the classification accuracy and computational cost are not satisfied. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Study on crack detection using image processing techniques and deep learning – a survey by Saleem, Muhammad Asif, Senan, Norhalina, Ahmad, Rehan

    Published 2020
    “…So it very well may be done consequently by utilizing image processing. Deep learning algorithms have been used for the solution of multiple issues in the area of image classification. …”
    Get full text
    Get full text
    Article
  6. 6

    Arabic Calligraphy Classification using Triangle Model for Digital Jawi Paleography Analysis by Azmi, Mohd Sanusi, Muda, A. K.

    Published 2011
    “…The features are extracted from the triangle to represent the Jawi (Arabic writing in Malay language) characters. Experiments have been conducted using seven Unsupervised Machine Learning (UML) algorithms and one Supervised Machine Learning (SML). …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Arabic Calligraphy Classification using Triangle Model for Digital Jawi Paleography Analysis by Mohd Sanusi, Azmi, Azah Kamilah, Muda

    Published 2011
    “…The features are extracted from the triangle to represent the Jawi (Arabic writing in Malay language) characters. Experiments have been conducted using seven Unsupervised Machine Learning (UML) algorithms and one Supervised Machine Learning (SML). …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Route Optimization System by Zulkifli, Abdul Hayy

    Published 2005
    “…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
    Get full text
    Get full text
    Final Year Project
  9. 9
  10. 10

    CHINESE CHARACTER RECOGNITION USING SUPPORT VECTOR MACHINE by Baharum A., Ismail R., Wahab S.H.A., Deris F.D., Noor N.A.M., Kasihmuddin M.S.M.

    Published 2023
    “…Chinese characters can be considered difficult because they have many categories, complex character structures, similarities between characters, and various fonts or writing styles. There are many known machine learning algorithms for character recognition, but not all can classify Chinese characters with high speed and accuracy. …”
    Article
  11. 11

    Analysis of Sentiment Based on Opinions from the 2019 Presidential Election by Nurul Adha Oktarini, Saputri, Misinem, ., Khoirul, Zuhri

    Published 2024
    “…This algorithm is well-suited for text classification tasks due to its simplicity and efficiency in handling large datasets. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Design and Implementation of Data-at-Rest Encryption for Hadoop by Wan Nor Shuhadah, Wan Nik, Mohamad Afendee, Mohamed, Zarina, Mohamad, Siti Hanisah, Kamaruzaman

    Published 2017
    “…It is shown that the implementation of AES encryption algorithm is capable to secure data stored in HDFS to some extent.…”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Design and Implementation of Data-at-Rest Encryption for Hadoop by Wan Nor Shuhadah, Wan Nik, Mohamad Afendee, Mohamed, Zarina, Mohamad, Siti Hanisah, Kamaruzaman

    Published 2017
    “…It is shown that the implementation of AES encryption algorithm is capable to secure data stored in HDFS to some extent.…”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Detection on ambiguous software requirements specification written in malay using machine learning by Zahrin, Mohd Firdaus

    Published 2017
    “…Four (4) algorithms have been evaluated to find the suitable classification algorithm for this purpose. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Features Extraction of Arabic Calligraphy using extended Triangle Model for Digital Jawi Paleography Analysis by Mohd Sanusi, Azmi, Muda, A. K., Khadijah Wan, Mohd Ghazali

    Published 2013
    “…For further verification, two Supervised Machine Learning (SML) and three Unsupervised Machine Learning (UML) algorithms were experimented. …”
    Get full text
    Get full text
    Article
  17. 17

    Fuzzy modeling using Bat Algorithm optimization for classification by Noor Amidah, Ahmad Sultan

    Published 2018
    “…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  18. 18

    Implementation of RIO in UMJaNetSim / Chan Chin We by Chan, Chin We

    Published 2004
    “…In this project, I will do some research on the recent TCP congestion control and avoidance mechanisms and implement one of the mechanisms into the Java Network Simulator (JaNetSim). …”
    Get full text
    Get full text
    Thesis
  19. 19

    Comparison of performances of Jaya Algorithm and Cuckoo Search algorithm using benchmark functions by Ahmed, Mashuk, Nasser, Abdullah B., Kamal Z., Zamli, Heripracoyo, Sulistyo

    Published 2022
    “…This paper aims to compare the performance of two metaheuristic algorithms which are Jaya Algorithm (JA) and Cuckoo Search (CS) using some common benchmark functions. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
    Get full text
    Get full text
    Thesis